A
  • Abdel-hafeez, Saleh A Comparison-Based Algorithm for Hardware- and SoftwareBased Median-Finding in Signal Processing Applications [Volume 14, Issue 1, 2016]
  • Abdipour, Mohammad Multi-Focus Image Fusion for Visual Sensor Networks in Wavelet Domain [Volume 11, Issue 2, 2014]
  • Abdollahi Azgomi, Mohammad A Parallel Numerical Solver of CTMCs and Its Implementation on Multi-Core Processors [Volume 9, Issue 1, 2011]
  • Abdollahzade, Ahmad A Request Processing System for Question Answering based on Ontology [Volume 4, Issue 1, 2006]
  • Abdollahzadeh Barforosh, Ahmad OAV-VVT Expert, an Active System for Verification and Validation of Knowledge Base Using OAV Knowledge Representation [Volume 1, Issue 4, 2004]
  • Abdollahzadeh Barforoush, Ahmad Research Areas in Agent Oriented Software Engineering (AOSE) [Volume 10, Issue 1, 2012]
  • Abdollahzadeh Barforoush, Ahmad Going Meta: Back to the Expectations [Volume 2, Issue 2, 2005]
  • Abdollahzadeh Barfouroush, Ahmad Flexibility in Negotiation Systems: An Argumentation-based Approach [Volume 3, Issue 2, 2006]
  • Abdoos, Mahboobeh An Industrial Internet of Things Architecture for Remote Areas [Volume 17, Issue 1, 2019]
  • Abdoos, Monireh Fingerprint Partial Matching using a Minutiae-based Combined Feature [Volume 6, Issue 1, 2008]
  • Abedi, Hajar Probabilistic Büchi Automata of Records: Semantics of Coordinating Systems with Uncertain Channels [Volume 12, Issue 3, 2014]
  • Abin, AhmadAli HiSeg: Unfolding of Segment Hierarchies in Color Images [Volume 8, Issue 2, 2011]
  • Adibi, Peyman Conditional Probability Distribution Divergence Reduction in Visual Domain Adaptation [Volume 17, Issue 2, 2020]
  • A. Edwan, Talal A Stochastic Model for Multi-Operational-Mode TCP in High-Speed Networks [Volume 16, Issue 1, 2018]
  • Aghajani, Khadije A Robust Voice Activity Detection Method for Noisy Speech Signals [Volume 4, Issue 3, 2006]
  • Agh Atabay, Habibollah Deep Learning for Horse Breed Recognition [Volume 15, Issue 1, 2017]
  • Aghdasifam, Masoud Modified Bitwise Hill Crypto System [Volume 12, Issue 2, 2015]
  • Ahmadi, Ali Developing a Virtual Interactive Tennis Game by Applying Learning Algorithms [Volume 13, Issue 1, 2015]
  • Ahmadi, Ali Simulation of Fuzzy Intelligent Agents in Stone-Age Virtual Ecosystem [Volume 14, Issue 2, 2017]
  • Ahmadi, Arash Parallel Implementation of Linux Packet Filtering [Volume 11, Issue 2, 2014]
  • Ahmadi, Gholamreza Two-Way Intelligent Trust Management Using Machine Learning and Subjective Logic in FOG [Volume 20, Issue 1, 2026, Pages 78-88]
  • Ahmadi, Mahmood Parallel Implementation of Linux Packet Filtering [Volume 11, Issue 2, 2014]
  • Ahmadi, Mahmood High Throughput Multi-Pipeline Packet Classifier on FPGA [Volume 9, Issue 2, 2012]
  • Ahmadi Mohammadabadi, Alireza GPU Implementation of Edge Histogram Descriptor and Color Moments Fused Features for Efficient Image Retrieval [Volume 9, Issue 2, 2012]
  • A. Kardan, Ahmad E-Learning Content Evaluation System for Determining the Degree of Concepts Transfer to Learners via Tags Analysis [Volume 11, Issue 3, 2013]
  • Akbari, Ahmad Robust Speech Recognition Based on Mapping Noisy Features to Clean Features [Volume 1, Issue 4, 2004]
  • Akbari, Ahmad VoIP Traffic Analysis for IMS Security [Volume 11, Issue 3, 2013]
  • Akbari, Ahmad Multi-criteria reactive approach for joint dynamic VNF load balancing and service auto-scaling in NFV [Volume 18, Issue 1, 2020, Pages 1-12]
  • Akbari, Ahmad Speech Enhancement Using Two New Filters Based on a Posteriori Probability Distribution of Wavelet Coefficients [Volume 6, Issue 3, 2008]
  • Akbari, Ahmad Introducing Speech Enhancement Filters in Wavelet Domain [Volume 8, Issue 1, 2010]
  • Akbari, Behzad A Distributed Improvement Mechanism for Mesh-Based Peer-toPeer Video-on-Demand Streaming [Volume 10, Issue 2, 2013]
  • Alamian, Sanaz RSFR: A Recursive Self-Testable and Fault-Tolerant Routing Protocol for NoC Routers [Volume 12, Issue 2, 2015]
  • Alavi, Hanieh A Modulo (2^n)+1 Multiplier with Faithful Representation of Residues [Volume 7, Issue 2, 2010]
  • Alavi, Seyed Majid Using integer programming to rough set based feature selection: An approach to find all reducts respectively [Volume 19, Issue 2, 2025, Pages 45-51]
  • AliAbadian, Amir Brain Tumor Segmentation Based on Deep Learning Using Multimodal MRI Images [Volume 20, Issue 1, 2026, Pages 38-45]
  • AliAbadian, Amir Online Multi-Object Tracking Using Convolutional Neural Networks and the Invasive Weed Optimization Algorithm [Volume 20, Issue 1, 2026, Pages 89-97]
  • Ali Abin, Ahmad Cellular Learning Automata in Image Processing Applications [Volume 8, Issue 1, 2010]
  • Ali Akramifar, Seyed Evaluating the Constant Weight in WA [Volume 5, Issue 1, 2007]
  • Aliee, Hananeh K2Router: A Low-Power and High-Performance Router Design for Networks-On-Chip [Volume 7, Issue 2, 2010]
  • Ali Khoshroo, Seyed A New Automatic Method for ICA Detection in Online Social Networks [Volume 14, Issue 2, 2017]
  • Ali Montazer, Gholam Email Spam Detection Using Linear Discriminant Analysis Based on Clustering [Volume 15, Issue 1, 2017]
  • Alipour, Mohammad Proposing A New Model of Fuzzy Particle Swarm Optimization (FPSO) with Increasing the Accuracy and Veracity of Convergence for Functions Optimization [Volume 10, Issue 1, 2012]
  • Ali Seyyedsalehi, Seyyed Nonlinear Enhancement of Noisy Speech Using Dynamic Attractors in Neural Networks [Volume 6, Issue 1, 2008]
  • Ali Seyyed Salehi, Seyyed Improvement of Speech Recognition Using Combination of Lexical Knowledge with Feature Parameters [Volume 3, Issue 3, 2005]
  • Alizadeh, Morteza Solving Moving Peaks Problem Using Memetic Algorithm Based on Fuzzy Particle Swarm Optimization [Volume 11, Issue 3, 2013]
  • Almasganj, Farshad Automatic Extraction of Pronunciation Rules and Generating Pronunciation Variants of Words to Use in Automatic Continuous Speech Recognition [Volume 3, Issue 3, 2005]
  • Almasganj, Farshad Hybrid statistical static and dynamic pronunciation models designed to be trained by a medium-size corpus [Volume 5, Issue 1, 2007]
  • Amanollahi, Saba Architecture-Level Design Space Exploration for Radix-16 Sequential Multipliers [Volume 13, Issue 1, 2015]
  • Ameri, Reyhaneh Authorship identification from unstructured texts: A stylometric approach [Volume 17, Issue 2, 2020]
  • Amin Ahmad Akhoundi, Mohammad Multi-Sensor Fuzzy Data Fusion Using Sensors with Different Characteristics [Volume 16, Issue 2, 2019]
  • Aminipour, Bahman Simulation of Fuzzy Intelligent Agents in Stone-Age Virtual Ecosystem [Volume 14, Issue 2, 2017]
  • Amirany, Abdolah Stochastic Spintronic Neuron for Hardware Implementation of Neural Networks [Volume 18, Issue 1, 2020, Pages 13-19]
  • Amir Asghari, Seyyed A Multi-View Group Recommender System based on Trust and Ratings [Volume 18, Issue 2, 2021, Pages 32-40]
  • Analoui, Morteza Grid-JQA: A New Method for Matching in Grid Environment [Volume 4, Issue 2, 2007]
  • Anamoradnejad, Issa Recommendation in Online Q&A Communities Based on BERT Pre-training Technique [Volume 18, Issue 2, 2021, Pages 53-60]
  • Anisheh, Mahmoud Automatic Analog IC Layout with CNN-Based Placement Using SqueezeNet and Multi-Objective Routing via DE and NSGA-III [(Articles in Press)]
  • A. Noroozi, Ali Modified Bitwise Hill Crypto System [Volume 12, Issue 2, 2015]
  • Ansari, Mohsen AdDQ: Low-Energy Hardware Replication for Real-Time Systems through Adaptive Dual-Queue Scheduling [Volume 15, Issue 1, 2017]
  • Ansari, Mohsen Energy-Budget-Aware Reliability Management in Multi-Core Embedded Systems with Hybrid Energy Source [Volume 15, Issue 2, 2018]
  • Arami, Arash Learning Cluster Type and Dissimilarity Metric for Each Cluster Using a Set of Possible Cluster Types [Volume 5, Issue 2, 2008]
  • Ardeshiri, Sanaz MetaRecall: An Ensemble Classifier with Dynamic Base Classifier Selection and Ordering [Volume 20, Issue 1, 2026, Pages 98-112]
  • Arige, Subramanyam Empirical Approach for Optimising Cumulative Network Lifetime in WSN with Hierarchical Clustering Technique Based on Fuzzy Logic [Volume 12, Issue 2, 2015]
  • Arumugam, Rathinavelu Syllable based ASR system for isolated Tamil words using fuzzy based neural network [Volume 19, Issue 2, 2025, Pages 11-18]
  • Asadi, Poya A High Speed Mixed Mode 4:2 Compressor [Volume 4, Issue 3, 2006]
  • Asadi Amiri, Sekineh Improving Image Dynamic Range for an Adaptive Quality Enhancement Using Gamma Correction [Volume 16, Issue 1, 2018]
  • Asadpour, Masoud Ant Colony Approach to Link Prediction in Social Networks [Volume 12, Issue 1, 2014]
  • A. Safaei, Ali Parallel Processing of Data Stream [Volume 11, Issue 1, 2013]
  • Asgharian, Hassan VoIP Traffic Analysis for IMS Security [Volume 11, Issue 3, 2013]
  • Asghar Khodaparast, Ali Design and Analysis of a Fully-Distributed Parallel Packet Switch with Buffered Demultiplexers [Volume 2, Issue 2, 2005]
  • Ashtiani, Mehrdad DiMAS: A Micro-service based Approach to Create Distributed Agent-based Simulations [Volume 19, Issue 1, 2025, Pages 70-86]
  • Assareh, Reza A New Self-Organizing Mobile Ad Hoc Network Using Case Base Reasoning [Volume 7, Issue 2, 2010]
  • Assarian, Ali A New Self-Organizing Mobile Ad Hoc Network Using Case Base Reasoning [Volume 7, Issue 2, 2010]
  • Asvadi, Alireza Online Visual Object Tracking Using Incremental Discriminative Color Learning [Volume 12, Issue 2, 2015]
  • A. Torkamani, Mohammad Recognition of Persian Handwritten Digit using Fuzzy Logic [Volume 4, Issue 1, 2006]
  • Azadi, Tayyebeh Surveying Some Roadmaps for Adoption Service Oriented Architecture [Volume 8, Issue 1, 2010]
  • Azarshab, Behnam MetaRecall: An Ensemble Classifier with Dynamic Base Classifier Selection and Ordering [Volume 20, Issue 1, 2026, Pages 98-112]
  • Azizi Mazreah, Arash A Novel Five-Transistor SRAM Cell for High Speed and High Density Applications [Volume 6, Issue 1, 2008]
  • Azmi, Paeiz A Distributed Area Based Method for WSN Localization [Volume 14, Issue 2, 2017]
  • Azmi, Reza Recognition of Printed Farsi Characters Using Contour-Based Features [Volume 1, Issue 1, 2003]
B
  • Badie, Kambiz Recognition of Printed Farsi Characters Using Contour-Based Features [Volume 1, Issue 1, 2003]
  • Badie, Kambiz Permissive Planning: Extending classical Planning to Uncertain Task Domains [Volume 1, Issue 1, 2003]
  • Badie, Kambiz Using Semantic Graph for Automatic Key Concept Extraction [Volume 17, Issue 1, 2019]
  • Baghaei, Ali A Targeted Hybrid Model to Customer Churn Prediction in the Insurance Industry (A Case Study) [Volume 18, Issue 2, 2021, Pages 1-15]
  • Bagher Dowlatshahi, Mohammad Solving Large Instances Symmetric Traveling Salesman Problem by a Hybrid Discrete Gravitational Search Algorithm [Volume 9, Issue 1, 2011]
  • Bagheri Shouraki, Saeed A Novel Evolutionary Approach for Two Dimensional Bin Packing [Volume 6, Issue 2, 2009]
  • Bagherzadeh, Nader An Ultra-Efficient Imprecise Adder for Approximate Computing Based on CNTFET [Volume 13, Issue 1, 2015]
  • Baharani, Mohammadreza A Predictive Task Migration Algorithm with Adaptive Migration Threshold for Dynamic Thermal Management of Multi-Core Processors [Volume 9, Issue 2, 2012]
  • Bahmaninezhad, Fahimeh Spectral Modeling Based on Gaussian Conditional Random Field for Statistical Parametric Speech Synthesis [Volume 10, Issue 2, 2013]
  • Bahrami, Jamshid The Construction of Fuzzy Classification Systems Using the Shuffled Frog Leaping Algorithm [Volume 15, Issue 2, 2018]
  • Bahramian, Faeze An Incentive Mechanism for Collaborative Networks using Random Matching Game [Volume 9, Issue 1, 2011]
  • Bakhshayeshi, Reza Performance Evaluation of Hypervisors using HPC Challenge Benchmark Suite [Volume 12, Issue 2, 2015]
  • Bakhshesh, Davood Improving Space and Time Complexity of the Gap-Greedy Spanner Algorithm [Volume 14, Issue 1, 2016]
  • Bakhshi, Bahador Timing Attack Against Blakley’s Modular Multiplication Algorithm [Volume 4, Issue 3, 2006]
  • Bakhtiari, Behzad Automatic Fluency Evaluation Using Speech Processing Applied in CALL [Volume 6, Issue 3, 2008]
  • Baleghi, Yassar Online Visual Object Tracking Using Incremental Discriminative Color Learning [Volume 12, Issue 2, 2015]
  • Banihashem, Houra Multi-Level Fixed-Outline Floorplanning Using Convex Optimization [Volume 13, Issue 1, 2015]
  • Baradaran, Mohammad Designing An Intelligent Transportation Systems Model [Volume 19, Issue 2, 2025, Pages 66-71]
  • Baradaran Khosrovshahi, Gholamreza Leveraging HPC Power for Solving Abstract Mathematical Problems [Volume 11, Issue 2, 2014]
  • Barari, Morteza Designing A Hybrid System of Electronic Negotiation and Fuzzy Decision Support System in Electronic Commerce [Volume 12, Issue 1, 2014]
  • Bastami, Masoume Integration of CTL, PTL, and DCVSL for Designing a Novel Fast Ternary Half Adder [Volume 15, Issue 1, 2017]
  • Bayat, Hossein A Deep Learning Method to Estimate 3D Point of Regard by Joint Head and Eye Information [Volume 13, Issue 2, 2016]
  • Bayat Sarmadi, Siavash A Non-interference Isolation Mapping to Eliminate Timing Channel Attacks [Volume 16, Issue 2, 2019]
  • Behain, Parmida Synthetic ECG signal generation, a review [Volume 19, Issue 1, 2025, Pages 25-36]
  • Behkamal, Behshid Proposing A Framework for Automatic Testing of Web-Based Applications and Evaluating the Results Using Quantitative Metrics [Volume 10, Issue 1, 2012]
  • Behkamal, Behshid B2BAQM-A Quality Model for Evaluation of B2B E-Commerce Applications [Volume 6, Issue 1, 2008]
  • Beigy, Hamid Complete Binary Search Mesh: A Concurrent Data Structure for Distributed Memory Parallel Computers [Volume 1, Issue 1, 2003]
  • Beigy, Hamid User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey I [Volume 1, Issue 2, 2003]
  • Beigy, Hamid Open Synchronous Cellular Learning Automata [Volume 1, Issue 4, 2004]
  • Beigy, Hamid Authorship identification from unstructured texts: A stylometric approach [Volume 17, Issue 2, 2020]
  • Beigy, Hamid Design of Local Rule for Cellular Automata Using Evolutionary Algorithms [Volume 7, Issue 1, 2009]
  • Beigy, Hamid Cellular Learning Automata in Image Processing Applications [Volume 8, Issue 1, 2010]
  • Beigy, Hamid An Adaptive Clustering Based Bayesian Optimization Algorithm for Continuous Optimization [Volume 9, Issue 1, 2011]
  • Belghadr, Armin An RNS Comparator via Dynamic Range Partitioning: The Case of {2^n - 1, 2^n, 2^(n+1) -1} [Volume 16, Issue 2, 2019]
  • Berenjkoub, Mehdi Some Suggestions to Enhance the Performance of SSL Handshake Protocol [Volume 7, Issue 1, 2009]
  • Biglari, Mohsen Designing an Online Face Recognition System using Graphics Processor [Volume 12, Issue 3, 2014]
  • Bihari Misra, Bijan Fuzzy Swarm Net (FSN) for Classification in Data Mining [Volume 5, Issue 2, 2008]
  • Bijankhan, Mahmood Automatic Extraction of Pronunciation Rules and Generating Pronunciation Variants of Words to Use in Automatic Continuous Speech Recognition [Volume 3, Issue 3, 2005]
  • Boostanchi, Behzad Approaches to implementing the lean methodology in software development: A survey [Volume 18, Issue 2, 2021, Pages 41-52]
  • Borhani, Mostafa Spatial-Spectral Hyper Spectral Classification Based on Statistical Dependence between Adjacent Pixels [Volume 11, Issue 2, 2014]
  • Borhani, Mostafa Spectral-Spatial Graph Kernel Machines in the Context of Hyper spectral Remote Sensing Image Classification [Volume 11, Issue 2, 2014]
  • Borna, Keivan A Java Pattern for File Uploading [Volume 8, Issue 2, 2011]
  • Bozorgmehr, Ali Novel Quaternary Operator for Cyclic Redundancy Check on Xilinx FPGAs [Volume 14, Issue 1, 2016]
C
  • Chaghari, Arash Verb Detection in Persian Language Sentences [Volume 11, Issue 3, 2013]
  • Chaji, Nasser Image Segmentation Combining Edge and Texture Information [Volume 3, Issue 1, 2005]
  • Chalechale, Abdolah GPU Implementation of Edge Histogram Descriptor and Color Moments Fused Features for Efficient Image Retrieval [Volume 9, Issue 2, 2012]
  • Chamkoori, Alireza Using deep reinforcement learning networks to provide dynamic scheduling in workplace environments [Volume 20, Issue 1, 2026, Pages 67-77]
D
  • Dadashtabar Ahmadi, Kourosh Designing A Hybrid System of Electronic Negotiation and Fuzzy Decision Support System in Electronic Commerce [Volume 12, Issue 1, 2014]
  • Dadkhah, Chitra OAV-VVT Expert, an Active System for Verification and Validation of Knowledge Base Using OAV Knowledge Representation [Volume 1, Issue 4, 2004]
  • Dadkhah, Chitra A Two-Stage Method for Optimizing the Parameters of CMOS Operational Amplifiers Based on Evolutionary Algorithm [Volume 14, Issue 2, 2017]
  • Dadkhah, Chitra Hybrid Movie Recommender System based on Resource Allocation [Volume 17, Issue 2, 2020]
  • Dadlani, Aresh Performance Analysis of Optical Packet-Switched Meshes: Metrics and Modeling [Volume 5, Issue 2, 2008]
  • Damir, Arwa A Comparison-Based Algorithm for Hardware- and SoftwareBased Median-Finding in Signal Processing Applications [Volume 14, Issue 1, 2016]
  • Dana, Arash Development in Handling the Problem of Fault Recovery in MPLS Networks Using Neural Network [Volume 6, Issue 2, 2009]
  • Dana, Arash A New Self-Organizing Mobile Ad Hoc Network Using Case Base Reasoning [Volume 7, Issue 2, 2010]
  • Darakeh, Fatemeh A Distributed Area Based Method for WSN Localization [Volume 14, Issue 2, 2017]
  • Darmanaki Farahani, Elham An Overview of the Methods and Opportunities for Creating Software Product Lines via Reengineering Legacy Systems [Volume 11, Issue 1, 2013]
  • Darrudi, Ehsan Ontology-based Question Answering System for Telecommunications with Document Extraction & Classification Abilities [Volume 2, Issue 1, 2004]
  • Dastghaibyfard, G.H. Effective, Fast and Load Balance Grid Scheduling with A Novel Ant Algorithm [Volume 12, Issue 1, 2014]
  • Davarpanah Djazi, Mohammad Processing and Compression of Microarray Images by Pipelining [Volume 1, Issue 3, 2003]
  • Davoudi, Saeedeh A Semantic-based Feature Extraction Method Using Categorical Clustering for Persian Document Classification [Volume 18, Issue 1, 2020, Pages 28-35]
  • Davoud Talebzadeh, Mohammad “Touch Your Lessons!” Smartphone-based science learning, a solution for deprived areas [Volume 19, Issue 1, 2025, Pages 37-42]
  • Dehghan, Mehdi Self-Stabilizing Virtual Backbone Construction in Selfish Wireless Ad-Hoc Networks [Volume 10, Issue 2, 2013]
  • Dehghani, Razieh Towards a Knowledge Management-Based Framework for Aligning Enterprise Architecture and Software Architecture [Volume 15, Issue 2, 2018]
  • Dehghan Menshadi, Maryam Adaptive Scheduling of Energy Harvesting Real-Time Systems [Volume 11, Issue 1, 2013]
  • Dehghanzadeh, Soheila Proposing A Framework for Automatic Testing of Web-Based Applications and Evaluating the Results Using Quantitative Metrics [Volume 10, Issue 1, 2012]
  • Dehuri, Satchidananda Fuzzy Swarm Net (FSN) for Classification in Data Mining [Volume 5, Issue 2, 2008]
  • Dehyadegari, Louiza Nonlinear Enhancement of Noisy Speech Using Dynamic Attractors in Neural Networks [Volume 6, Issue 1, 2008]
  • Dehyadegari, Masoud Adaptive Cache Clustering in Multi-Core Architecture [Volume 17, Issue 1, 2019]
  • Dianat, R Automatic diagnosis of retinal diseases using a new method in Deep Dictionary Learning on OCT images [Volume 19, Issue 2, 2025, Pages 39-44]
  • Dowlatshahi, Mohammad Bagher Feature Selection in Multi-label Classification based on Binary Quantum Gravitational Search Algorithm [Volume 19, Issue 1, 2025, Pages 61-69]
E
  • Ebadi, Ali Comparing Time-Series Analysis Approaches Utilized in Research Papers to Forecast COVID-19 Cases in Africa: A Literature Review [Volume 20, Issue 1, 2026, Pages 27-37]
  • Ebrahim Abtahi, Seyed Computer Based System for Development and Improvement of Code of Ethics with Success Evaluation Capability [Volume 11, Issue 1, 2013]
  • Ebrahim Abtahi, Seyed A Preventive and Guidance Framework for Effective Establishment of Post-Disciplinary Education in Computing Science and Engineering in Iran [Volume 12, Issue 3, 2014]
  • Ebrahimnejad, Ali A Novel approach for the Navigation Issues using Soft Computing [Volume 19, Issue 2, 2025, Pages 52-65]
  • Ebrahimpour Komleh, Hossein Designing an Online Face Recognition System using Graphics Processor [Volume 12, Issue 3, 2014]
  • Ejlali, Alireza AdDQ: Low-Energy Hardware Replication for Real-Time Systems through Adaptive Dual-Queue Scheduling [Volume 15, Issue 1, 2017]
  • Ejlali, Alireza Energy-Budget-Aware Reliability Management in Multi-Core Embedded Systems with Hybrid Energy Source [Volume 15, Issue 2, 2018]
  • Emadi, Sima A New Executable Model of Software Architecture for Performance Evaluation [Volume 7, Issue 1, 2009]
  • Emami, Samaneh Exploring Reconfigurability Options Among Decimal Adders [Volume 13, Issue 2, 2016]
  • Entezari, Rahim A Deep Learning Method to Estimate 3D Point of Regard by Joint Head and Eye Information [Volume 13, Issue 2, 2016]
  • Entezari-Maleki, Reza A Toolkit for Data Cloud Simulation with the Capability of Replica Management: An Extension to CloudSim [Volume 12, Issue 3, 2014]
  • Erfanian Omidvar, Abbas Feature Extraction Using Mutual Information for Classification of Electroencephalogram in Brain Computer Interface [Volume 6, Issue 3, 2008]
  • Esfandiari, Sara A Hybrid Model Based on Reinforcement Learning and Case Base Reasoning to Increase Performance of Multi Agent Systems [Volume 11, Issue 1, 2013]
  • Eshghi, Abdollah A new framework for combining supervised and semi-supervised methods in fraud detection [Volume 16, Issue 2, 2019]
  • Eshghi, Mohammad FinFET Based Level Converter for Multi-VDD System Design [Volume 14, Issue 1, 2016]
  • Eshghi, Mohammad An Efficient OHR Subtractor Circuit [Volume 7, Issue 2, 2010]
  • Eskandari, Marzieh The Illumination of Polygonal Regions with Modems [Volume 8, Issue 2, 2011]
  • Eslami, Ziba Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata [Volume 14, Issue 1, 2016]
  • Esmaeilzadeh, Hadi A New Register Allocation Method For Testability Improvement [Volume 1, Issue 3, 2003]
  • Esnaashari, Mahdi Using Learning Automaton to Thwart Selective Forwarding Attack in Wireless Sensor Networks [Volume 11, Issue 3, 2013]
F
  • Faghih Mirzaee, Reza Integration of CTL, PTL, and DCVSL for Designing a Novel Fast Ternary Half Adder [Volume 15, Issue 1, 2017]
  • Faili, Heshaam An Energy-Optimal Real-Time Scheduling Algorithm for Unrelated DVS-Enabled Parallel Machines [Volume 13, Issue 2, 2016]
  • Fallahzadeh, Ramin RSFR: A Recursive Self-Testable and Fault-Tolerant Routing Protocol for NoC Routers [Volume 12, Issue 2, 2015]
  • Famil Samavati, Faramarz A Local Optimal Method for Multiresolution Smooth Models [Volume 1, Issue 1, 2003]
  • Farajipour Ghohroud, Najmeh Improving Effectiveness of Hardware Trojan Detection using Fault Injection [Volume 14, Issue 2, 2017]
  • Farhoodfar, Arash Using Standard HDLs and CAD Tools for the Design and Simulation of Asynchronous Circuits [Volume 1, Issue 4, 2004]
  • Farrokhi, Sam Improving the Retiming Algorithm to Increase the Clock Speed of Synchronous Circuits [Volume 1, Issue 3, 2003]
  • Farshi, Mohammad Improving Space and Time Complexity of the Gap-Greedy Spanner Algorithm [Volume 14, Issue 1, 2016]
  • Farshi, Mohammad Progressive sorting in the external memory model [Volume 15, Issue 2, 2018]
  • Farshi, Mohammad On The Spread of a Uniformly Distributed Point Set [Volume 17, Issue 1, 2019]
  • Farzinvash, Leili Energy-Aware Scheduling of Execution-Instant Sensitive Real-Time Systems [Volume 7, Issue 2, 2010]
  • Fathy, Mahmood Performance Analysis of Fully Adaptive Routing Algorithms in Wormhole-Switched Interconnect Networks ∗ [Volume 3, Issue 2, 2006]
  • Fathy, Mahmoud Internet Packet Classification Using Prefix-Based Bitmap Intersection [Volume 3, Issue 1, 2005]
  • Fathy Amir, Mahmood A Deep Learning Method to Estimate 3D Point of Regard by Joint Head and Eye Information [Volume 13, Issue 2, 2016]
  • Fazli, MohammadAmin On Dynamic Monopolies of Cubic Graphs [Volume 15, Issue 1, 2017]
  • Fazli, MohammadAmin Future Parameter Prediction By Scoring Rules [Volume 16, Issue 2, 2019]
  • Fazli, MohammadAmin A Video Game Testing Method Utilizing Deep Learning [Volume 17, Issue 2, 2020]
  • Feili, Heshaam Using a Tree-Adjoining Grammar in Translating English into Persian [Volume 3, Issue 1, 2005]
  • Fiuzy, Mohammad Proposing A New Model of Fuzzy Particle Swarm Optimization (FPSO) with Increasing the Accuracy and Veracity of Convergence for Functions Optimization [Volume 10, Issue 1, 2012]
  • Fiuzy, Mohammad Improved ICA by Multivariable Regression Based on Fuzzy Logic [Volume 12, Issue 3, 2014]
  • Forghani-elahabad, Majid Finding All the Upper Boundary Points of a Stochastic-Flow Network with Budget Constraints [Volume 8, Issue 2, 2011]
  • Foroutannaddafi, Mahmoud Modeling the Impact of Soil Liquefaction on Structural Stability Using an Artificial Neural Network Optimized by NSGA-III [Volume 20, Issue 1, 2026, Pages 128-137]
  • Fotouhi, Ramin Nature-inspired and teaching-learning-based methods for improving convergence speed in multi-agent systems [Volume 18, Issue 1, 2020, Pages 54-59]
  • Fouladian, Majid Performance Improvement of CIGS Thin-Film Solar Cells by Incorporating an ITO Photoanode and Designing a Structured Back Layer [Volume 20, Issue 1, 2026, Pages 9-26]
G
  • Ghaffari Nejad, Ali Constrained Portfolio Optimization with Neural Network on the Grid [Volume 10, Issue 1, 2012]
  • Ghaffari Sheshjavani, Abdollah A Distributed Improvement Mechanism for Mesh-Based Peer-toPeer Video-on-Demand Streaming [Volume 10, Issue 2, 2013]
  • Gharedaghi, Fatemeh Temperature-Aware Speed Scheduling in Periodic Real-Time Systems [Volume 12, Issue 2, 2015]
  • Gharibshah, Joobin Hybrid Movie Recommender System based on Resource Allocation [Volume 17, Issue 2, 2020]
  • GHARIBSHAH, M Investigating the sources of receiving news when the internet is cut off in Iran and its consequences [Volume 19, Issue 2, 2025, Pages 76-87]
  • Ghasemi Motlagh, Hassan The Impact of Excess-Modulo Representation of Residues on Modulo-(2^n-5) Parallel Prefix Addition [Volume 13, Issue 2, 2016]
  • Ghassemi, Fatemeh Verification of Mobile Ad hoc Network Processes with Data [Volume 15, Issue 2, 2018]
  • Ghassemi, Fatemeh Formal Modeling Routing Protocols in Mobile Ad Hoc Networks [Volume 5, Issue 2, 2008]
  • Ghassemian, Hassan Spatial-Spectral Hyper Spectral Classification Based on Statistical Dependence between Adjacent Pixels [Volume 11, Issue 2, 2014]
  • Ghassemian, Hassan Spectral-Spatial Graph Kernel Machines in the Context of Hyper spectral Remote Sensing Image Classification [Volume 11, Issue 2, 2014]
  • Ghassemian, Hassan Image Segmentation Combining Edge and Texture Information [Volume 3, Issue 1, 2005]
  • Ghassemian, Hassan Fingerprint Classification Based on Spectral Features [Volume 3, Issue 2, 2006]
  • Ghassem-Sani, Gholamreza Using a Tree-Adjoining Grammar in Translating English into Persian [Volume 3, Issue 1, 2005]
  • Ghassem-Sani, GholamReza Evaluating the Constant Weight in WA [Volume 5, Issue 1, 2007]
  • Ghazali, Rana Improving Tora Routing Protocol in MANETs using ANT Colony Algorithm [Volume 8, Issue 1, 2010]
  • GHNJI, B Investigating the sources of receiving news when the internet is cut off in Iran and its consequences [Volume 19, Issue 2, 2025, Pages 76-87]
  • Ghodsi, Mohammad A New Algorithm for Guarding Triangulated Irregular Networks* [Volume 2, Issue 2, 2005]
  • Ghodsi, Mohammad RAQ: A Range-Queriable Distributed Data Structure [Volume 6, Issue 2, 2009]
  • Gholamian, Mehdi Automatic Analog IC Layout with CNN-Based Placement Using SqueezeNet and Multi-Objective Routing via DE and NSGA-III [(Articles in Press)]
  • Gholipour, Mahmood An Energy-Optimal Real-Time Scheduling Algorithm for Unrelated DVS-Enabled Parallel Machines [Volume 13, Issue 2, 2016]
  • Ghorbani Hagh, Panteha Channel allocation using Learning Automata in Cognitive Radio Networks [Volume 16, Issue 1, 2018]
  • Ghorbannia Delavar, Arash Very High Speed Current-Mode Logical Gates [Volume 3, Issue 1, 2005]
  • Goudarzi, Maziar Process-Variation-Aware Instruction Rescheduling to Reduce Leakage in Nanometer Instruction Caches [Volume 5, Issue 2, 2008]
H
  • Habibi, Elahe Studying and Characterizing Aspect-Oriented Programming Languages and Aspect Mining Techniques [Volume 12, Issue 3, 2014]
  • Habibi, Jafar Using Layered GA in Multi-agent Learning [Volume 1, Issue 2, 2003]
  • Habibi, Jafar An Overview of the Methods and Opportunities for Creating Software Product Lines via Reengineering Legacy Systems [Volume 11, Issue 1, 2013]
  • Habibi, Jafar Data Center Selection Based on Cloud Customers’ Preferences of Quality Attributes for Federated Clouds [Volume 15, Issue 1, 2017]
  • Habibi, Jafar Towards a Knowledge Management-Based Framework for Aligning Enterprise Architecture and Software Architecture [Volume 15, Issue 2, 2018]
  • Habibi, Jafar Future Parameter Prediction By Scoring Rules [Volume 16, Issue 2, 2019]
  • Habibi, Jafar Recommendation in Online Q&A Communities Based on BERT Pre-training Technique [Volume 18, Issue 2, 2021, Pages 53-60]
  • Habibi, Jafar A New Architecture for Multi Agent System in Rescue Simulation Environment [Volume 3, Issue 2, 2006]
  • Habibi, Jafar New Goal-Oriented Approach to Assess Main Virtual Organization’s Elements Integrated with Model-Based Methods [Volume 20, Issue 1, 2026, Pages 1-8]
  • Habibi, Moslem Comparison of Cloud Federation Models with Selfish Cloud Service Providers [Volume 16, Issue 1, 2018]
  • Habibi, Moslem A Video Game Testing Method Utilizing Deep Learning [Volume 17, Issue 2, 2020]
  • Habibi, Moslem Volume-Enhanced Stock Price Forecasting: Multivariate Approach with Large Language Models [Volume 19, Issue 2, 2025, Pages 1-10]
  • Haddadnia, Javad Proposing A New Model of Fuzzy Particle Swarm Optimization (FPSO) with Increasing the Accuracy and Veracity of Convergence for Functions Optimization [Volume 10, Issue 1, 2012]
  • Haddadnia, Javad Improved ICA by Multivariable Regression Based on Fuzzy Logic [Volume 12, Issue 3, 2014]
  • Haghighi, Hassan The Construction of Fuzzy Classification Systems Using the Shuffled Frog Leaping Algorithm [Volume 15, Issue 2, 2018]
  • Haghighi, Hassan Improving Recommender Systems Using Context-Dependent Trust Relationships [Volume 16, Issue 1, 2018]
  • Haghparast, Majid Novel Designs of Fast Parity-Preserving Reversible Vedic Multiplier [Volume 17, Issue 1, 2019]
  • Haghshenas, Hamid Data Center Selection Based on Cloud Customers’ Preferences of Quality Attributes for Federated Clouds [Volume 15, Issue 1, 2017]
  • Haghshenas, Hamid Comparison of Cloud Federation Models with Selfish Cloud Service Providers [Volume 16, Issue 1, 2018]
  • Hajizadeh, Saeed Future Parameter Prediction By Scoring Rules [Volume 16, Issue 2, 2019]
  • Hakami, Vesal Self-Stabilizing Virtual Backbone Construction in Selfish Wireless Ad-Hoc Networks [Volume 10, Issue 2, 2013]
  • Halavati, Ramin A Novel Evolutionary Approach for Two Dimensional Bin Packing [Volume 6, Issue 2, 2009]
  • Hamid Amiri, Seyed Cellular Learning Automata in Image Processing Applications [Volume 8, Issue 1, 2010]
  • Hamiyati Vaghef, Vahid Reliability Analysis of Sequential Logic Circuits Using Signal Flow Graphs [Volume 18, Issue 1, 2020, Pages 36-43]
  • Hanoosh, Zaid A Parallel Architecture for Motion Estimation in HEVC Encoder [Volume 15, Issue 2, 2018]
  • Haqiqat, Payman Object Tracking in an Image Sequence [Volume 1, Issue 3, 2003]
  • Harati Zadeh, Saman A Novel Evolutionary Approach for Two Dimensional Bin Packing [Volume 6, Issue 2, 2009]
  • Hashempour, Masoud Using Error Compensation for Defect Tolerance of Nano-Systems* [Volume 6, Issue 2, 2009]
  • Hassan Mirian HosseinAbadi, Seyed SWIG Workflow Engine Generator [Volume 8, Issue 1, 2010]
  • Hassan Nabavi-kerizi, Seyyed Classifier Combination: Diversity Creation and Combination Methods [Volume 3, Issue 3, 2005]
  • Hassanpour, Hamid Improving Image Dynamic Range for an Adaptive Quality Enhancement Using Gamma Correction [Volume 16, Issue 1, 2018]
  • Hatami, Rashid High Throughput Multi-Pipeline Packet Classifier on FPGA [Volume 9, Issue 2, 2012]
  • Hatefi, Elham Conditional Probability Distribution Divergence Reduction in Visual Domain Adaptation [Volume 17, Issue 2, 2020]
  • Heidari, Hadis GPU Implementation of Edge Histogram Descriptor and Color Moments Fused Features for Efficient Image Retrieval [Volume 9, Issue 2, 2012]
  • Hemati, Mojdeh Analysis of incentive mechanism in Repchain [Volume 19, Issue 1, 2025, Pages 87-92]
  • Hemati, Mojdeh Analysis of incentive mechanism in Repchain [Volume 19, Issue 2, 2025, Pages 33-38]
  • Hessabi, Shaahin RSFR: A Recursive Self-Testable and Fault-Tolerant Routing Protocol for NoC Routers [Volume 12, Issue 2, 2015]
  • Hessabi, Shaahin A Low-Power Hierarchical FinFET-Based SRAM [Volume 13, Issue 2, 2016]
  • Hessabi, Shaahin Improving Effectiveness of Hardware Trojan Detection using Fault Injection [Volume 14, Issue 2, 2017]
  • Hessabi, Shaahin A Non-interference Isolation Mapping to Eliminate Timing Channel Attacks [Volume 16, Issue 2, 2019]
  • Hessabi, Shaahin Reducing Access Time in an Object-Oriented ASIP by Splitting Cache Memory [Volume 4, Issue 3, 2006]
  • Heydarnoori, Abbas An Overview of the Methods and Opportunities for Creating Software Product Lines via Reengineering Legacy Systems [Volume 11, Issue 1, 2013]
  • Heydarnoori, Abbas Studying and Characterizing Aspect-Oriented Programming Languages and Aspect Mining Techniques [Volume 12, Issue 3, 2014]
  • Hossein Ekbatanifard, Gholam An Energy-Efficient Asynchronous Multichannel MAC Protocol for Wireless Sensor Networks [Volume 9, Issue 1, 2011]
  • Hossein Elahibakhsh, Amir A Study on the Role of Exploration in Multiagent Reinforcement Learning Considering Task Type [Volume 3, Issue 3, 2005]
  • Hossein Heidarizadeh, Amir A Profit-Aware Allocation of High Performance Computing Applications on Distributed Cloud Data Centers with Environmental Considerations [Volume 10, Issue 2, 2013]
  • Hosseini, Monireh A Targeted Hybrid Model to Customer Churn Prediction in the Insurance Industry (A Case Study) [Volume 18, Issue 2, 2021, Pages 1-15]
  • Hossein Kahaei, Mohammad Improving Convergence of the PNLMS Algorithm in Sparse Echo Cancellation using SVS-PNLMS Algorithm [Volume 5, Issue 1, 2007]
  • Hossein Khasteh, Seyed A New Automatic Method for ICA Detection in Online Social Networks [Volume 14, Issue 2, 2017]
  • Hossein Moaiyeri, Mohammad An Ultra-Efficient Imprecise Adder for Approximate Computing Based on CNTFET [Volume 13, Issue 1, 2015]
  • Hossein Moaiyeri, Mohammad A Low-Power Hierarchical FinFET-Based SRAM [Volume 13, Issue 2, 2016]
  • Hossein Moaiyeri, Mohammad FinFET Based Level Converter for Multi-VDD System Design [Volume 14, Issue 1, 2016]
  • Hossein Moaiyeri, Mohammad Stochastic Spintronic Neuron for Hardware Implementation of Neural Networks [Volume 18, Issue 1, 2020, Pages 13-19]
  • Hossein Sajedi, Horialsadat Implementation of Efficient Modulo 2n+1 Squarer for {2n-1, 2n, 2n+1} Based Residue Number System [Volume 14, Issue 2, 2017]
  • Hossein Saraee, Mohammad Towards Persian Text Mining: A Categorisation Approach [Volume 8, Issue 1, 2010]
  • Hossein Yaghmaee Moghadam, Mohammad An Energy-Efficient Asynchronous Multichannel MAC Protocol for Wireless Sensor Networks [Volume 9, Issue 1, 2011]
  • Hossein Yaghmai Moghadam, Mohammad Design of an Artificial Evolutionary Fuzzy Immune System for Computer Network Security [Volume 3, Issue 3, 2005]
I
  • Imani, Maryam Email Spam Detection Using Linear Discriminant Analysis Based on Clustering [Volume 15, Issue 1, 2017]
  • Imani, Maryam Guided Ridge Regression-Based Polarimetric-Spatial Feature Extraction for Classification of Polarimetric SAR Images [Volume 18, Issue 1, 2020, Pages 44-53]
  • Iranfar, Behnam On The Spread of a Uniformly Distributed Point Set [Volume 17, Issue 1, 2019]
  • Isapareh, Morteza VoIP Traffic Analysis for IMS Security [Volume 11, Issue 3, 2013]
  • Isazadeh, Ayaz A Model for Evaluating the Vulnerability of Source Code from Its Architecture [Volume 12, Issue 1, 2014]
  • Ishihara, Tohru Process-Variation-Aware Instruction Rescheduling to Reduce Leakage in Nanometer Instruction Caches [Volume 5, Issue 2, 2008]
  • Izadi, Mohammad Probabilistic Büchi Automata of Records: Semantics of Coordinating Systems with Uncertain Channels [Volume 12, Issue 3, 2014]
  • Izadi, Mohammad An Efficient Model Checking Algorithm for a Fragment of μ-Calculus [Volume 3, Issue 3, 2005]
  • Izadkhah, Habib A Model for Evaluating the Vulnerability of Source Code from Its Architecture [Volume 12, Issue 1, 2014]
J
  • Jaberipur, Ghassem Architecture-Level Design Space Exploration for Radix-16 Sequential Multipliers [Volume 13, Issue 1, 2015]
  • Jaberipur, Ghassem The Impact of Excess-Modulo Representation of Residues on Modulo-(2^n-5) Parallel Prefix Addition [Volume 13, Issue 2, 2016]
  • Jaberipur, Ghassem A One-Step Modulo 2^n+1 Adder Based on Double-lsb Representation of Residues [Volume 4, Issue 2, 2007]
  • Jaberipur, Ghassem A Generic Modulo 2^n –1 Adder Based on Stored Negabit Representation of Residues [Volume 6, Issue 2, 2009]
  • Jaberipur, Ghassem A Modulo (2^n)+1 Multiplier with Faithful Representation of Residues [Volume 7, Issue 2, 2010]
  • Jafari, Kian Stochastic Spintronic Neuron for Hardware Implementation of Neural Networks [Volume 18, Issue 1, 2020, Pages 13-19]
  • Jahangir, Amir-Hossein A New Register Allocation Method For Testability Improvement [Volume 1, Issue 3, 2003]
  • Jahanian, Ali Multi-input DNA-based Logic Gates for Profiling the MicroRNA Biomarkers of Hepatitis-C Viral Infection [Volume 18, Issue 2, 2021, Pages 16-23]
  • Jahanian, Ali Efficient Buffer Resource Distribution by Buffer Planning in Floorplanning Level to Improve Buffer Usage and Routing Congestion [Volume 5, Issue 3, 2007]
  • Jahanian, Ali RF Resource Planning in Application Specific Integrated Circuits to Improve Timing Closure [Volume 9, Issue 2, 2012]
  • Jain, Madhu Performance Analysis in Double Layer Cellular Network with New Call Bounding Scheme and Directed Retry [Volume 9, Issue 2, 2012]
  • Jalali, Ali Implementation of Efficient Modulo 2n+1 Squarer for {2n-1, 2n, 2n+1} Based Residue Number System [Volume 14, Issue 2, 2017]
  • Jalili, Saeed Extending the Constraint Solving Method for Analysis of Security Protocols with Commutative Encryption [Volume 10, Issue 1, 2012]
  • Jalili, Saeed Quantitative Evaluation of Architectural Styles from the Reliability Viewpoint in Safety Critical Software [Volume 6, Issue 3, 2008]
  • Jamshidi, Mojtaba Using Learning Automaton to Thwart Selective Forwarding Attack in Wireless Sensor Networks [Volume 11, Issue 3, 2013]
  • Javad Amiri, Mohammad ‫‍‍ Semi-Automated Entity, Goals Model, and Business Process Model Driven Service Identification [Volume 11, Issue 3, 2013]
  • Javanbakht, Mehrshid New Goal-Oriented Approach to Assess Main Virtual Organization’s Elements Integrated with Model-Based Methods [Volume 20, Issue 1, 2026, Pages 1-8]
  • Joghatayi, Mohammad Amin Porosity Evaluation Using Artificial Neural Network, Optimized with GA and PSO [Volume 20, Issue 1, 2026, Pages 46-52]
  • Joghatayi, Mohammad Amin Application of Optimized Artificial Neural Networks for Predicting Reservoir Permeability [(Articles in Press)]
K
  • Kabir, Ehsanollah Recognition of Printed Farsi Characters Using Contour-Based Features [Volume 1, Issue 1, 2003]
  • Kabir, Ehsanollah Combining Low-level Features for Semantic Image Classification [Volume 2, Issue 1, 2004]
  • Kabir, Ehsanollah Classifier Combination: Diversity Creation and Combination Methods [Volume 3, Issue 3, 2005]
  • Kabir, Ehsanollah An Expert System for Emotion Recognition from Face Image Sequences [Volume 4, Issue 1, 2006]
  • Kahani, Mohsen Proposing A Framework for Automatic Testing of Web-Based Applications and Evaluating the Results Using Quantitative Metrics [Volume 10, Issue 1, 2012]
  • Kahani, Mohsen B2BAQM-A Quality Model for Evaluation of B2B E-Commerce Applications [Volume 6, Issue 1, 2008]
  • Kalantari, Mohammad A Neural Network Realization of File Transfer Scheduling [Volume 2, Issue 2, 2005]
  • Kamaledine Mousavi Mashhadi, Seyed Improved ICA by Multivariable Regression Based on Fuzzy Logic [Volume 12, Issue 3, 2014]
  • Kamaledin Mousavi Mashhadi, Seyed Proposing A New Model of Fuzzy Particle Swarm Optimization (FPSO) with Increasing the Accuracy and Veracity of Convergence for Functions Optimization [Volume 10, Issue 1, 2012]
  • Karami, Mohammadreza Online Visual Object Tracking Using Incremental Discriminative Color Learning [Volume 12, Issue 2, 2015]
  • Kargahi, Mehdi Adaptive Scheduling of Energy Harvesting Real-Time Systems [Volume 11, Issue 1, 2013]
  • Kargahi, Mehdi Temperature-Aware Speed Scheduling in Periodic Real-Time Systems [Volume 12, Issue 2, 2015]
  • Kargahi, Mehdi An Energy-Optimal Real-Time Scheduling Algorithm for Unrelated DVS-Enabled Parallel Machines [Volume 13, Issue 2, 2016]
  • Kargahi, Mehdi Energy-Aware Scheduling of Execution-Instant Sensitive Real-Time Systems [Volume 7, Issue 2, 2010]
  • Kargari, Mehrdad A new framework for combining supervised and semi-supervised methods in fraud detection [Volume 16, Issue 2, 2019]
  • Karimi, Keyvan Parallel Implementation of Linux Packet Filtering [Volume 11, Issue 2, 2014]
  • Karimi, Nader Processing and Compression of Microarray Images by Pipelining [Volume 1, Issue 3, 2003]
  • Karimi, Shirin A Genetic Algorithm for Scheduling Grids with Hierarchical Architecture [Volume 7, Issue 1, 2009]
  • Karimpour, Jaber A Model for Evaluating the Vulnerability of Source Code from Its Architecture [Volume 12, Issue 1, 2014]
  • Karimpour, Jaber Modified Bitwise Hill Crypto System [Volume 12, Issue 2, 2015]
  • Karshenas, Hossein Conditional Probability Distribution Divergence Reduction in Visual Domain Adaptation [Volume 17, Issue 2, 2020]
  • Kashi, Somayeh A Fast Hardware Implementation of STON Algorithm for Comparing 3-D Structure of Proteins in FPGA [Volume 13, Issue 1, 2015]
  • Kasiri, Hossein “Touch Your Lessons!” Smartphone-based science learning, a solution for deprived areas [Volume 19, Issue 1, 2025, Pages 37-42]
  • Kavehie, Omid A High Speed Mixed Mode 4:2 Compressor [Volume 4, Issue 3, 2006]
  • Kavei, Omid A Novel Methodology for Timing Behavior Recognition of Balanced XOR-XNOR Circuits [Volume 5, Issue 3, 2007]
  • Kaviani Shahrezaei, Hoda Introducing Speech Enhancement Filters in Wavelet Domain [Volume 8, Issue 1, 2010]
  • Kazem Akbari, Mohammad Constrained Portfolio Optimization with Neural Network on the Grid [Volume 10, Issue 1, 2012]
  • Kazem Akbari, Mohammad Performance Criteria Evaluation for Network Computation Management by Mobile Agents [Volume 10, Issue 1, 2012]
  • Kazem Akbari, Mohammad Performance Evaluation of Hypervisors using HPC Challenge Benchmark Suite [Volume 12, Issue 2, 2015]
  • Kazem Akbari, Mohammad A Neural Network Realization of File Transfer Scheduling [Volume 2, Issue 2, 2005]
  • Kazem Akbari, Mohammad B2BAQM-A Quality Model for Evaluation of B2B E-Commerce Applications [Volume 6, Issue 1, 2008]
  • Kazem Akbari, Mohammad A Genetic Algorithm for Scheduling Grids with Hierarchical Architecture [Volume 7, Issue 1, 2009]
  • Kazemian, Majid Recognition of Persian Handwritten Digit using Fuzzy Logic [Volume 4, Issue 1, 2006]
  • Kazemi Parsa, Mohsen Very High Speed Current-Mode Logical Gates [Volume 3, Issue 1, 2005]
  • Keshavarziyan, Peiman Efficient Symmetrical Imprecise 1-Bit Full Adder Cells Using CNFET Technology for Image Processing Applications [Volume 17, Issue 2, 2020, Pages 46-61]
  • Khademzadeh, Ahmad A Systematic Method for Testing of Bus-Based Communication Structures of Complex Chips [Volume 5, Issue 3, 2007]
  • Khadem Zadeh, Ahmad A New Self-Organizing Mobile Ad Hoc Network Using Case Base Reasoning [Volume 7, Issue 2, 2010]
  • Khaksar Manshad, Abbas Porosity Evaluation Using Artificial Neural Network, Optimized with GA and PSO [Volume 20, Issue 1, 2026, Pages 46-52]
  • Khaksar Manshad, Abbas Application of Optimized Artificial Neural Networks for Predicting Reservoir Permeability [(Articles in Press)]
  • Khalaji, Mostafa Hybrid Movie Recommender System based on Resource Allocation [Volume 17, Issue 2, 2020]
  • Khazaei, Atefeh Prediction of Exploit Using Text Mining [Volume 11, Issue 1, 2013]
  • Khazravi, Narges Using integer programming to rough set based feature selection: An approach to find all reducts respectively [Volume 19, Issue 2, 2025, Pages 45-51]
  • Kheradmandian, Ghorban A Request Processing System for Question Answering based on Ontology [Volume 4, Issue 1, 2006]
  • Khezriyan, Navid Recommendation in Online Q&A Communities Based on BERT Pre-training Technique [Volume 18, Issue 2, 2021, Pages 53-60]
  • Khonsari, Ahmad Leveraging HPC Power for Solving Abstract Mathematical Problems [Volume 11, Issue 2, 2014]
  • Khonsari, Ahmad Performance Analysis of Fully Adaptive Routing Algorithms in Wormhole-Switched Interconnect Networks ∗ [Volume 3, Issue 2, 2006]
  • Khonsari, Ahmad Anonymous Communication in MANETs Using Pseudonymity in Chain-Based Routing [Volume 4, Issue 2, 2007]
  • Khonsari, Ahmad Performance Analysis of Optical Packet-Switched Meshes: Metrics and Modeling [Volume 5, Issue 2, 2008]
  • Khorram, Soheil Spectral Modeling Based on Gaussian Conditional Random Field for Statistical Parametric Speech Synthesis [Volume 10, Issue 2, 2013]
  • Khorsandi, Siavash Automated Design and Dimensioning of Virtual Networks [Volume 1, Issue 2, 2003]
  • Khorsandi, Siavash Design and Analysis of a Fully-Distributed Parallel Packet Switch with Buffered Demultiplexers [Volume 2, Issue 2, 2005]
  • Khoshavi, Navid On-Line Control Flow Error Detection and Correction Based on Monitoring Both Data-Flow and Control-Flow Graphs [Volume 10, Issue 2, 2013]
  • Kiaee, Farkhondeh Smart ATM Cash Replenishment Planning using Deep Reinforcement Learning [Volume 19, Issue 2, 2025, Pages 19-26]
  • Kiani, Reza Performance Improvement of CIGS Thin-Film Solar Cells by Incorporating an ITO Photoanode and Designing a Structured Back Layer [Volume 20, Issue 1, 2026, Pages 9-26]
  • Kianrad, Ahmad Performance Analysis of Optical Packet-Switched Meshes: Metrics and Modeling [Volume 5, Issue 2, 2008]
  • Kishore Dash, Pradipta Fuzzy Swarm Net (FSN) for Classification in Data Mining [Volume 5, Issue 2, 2008]
  • Kiyaei, Mohammadhossein Smart ATM Cash Replenishment Planning using Deep Reinforcement Learning [Volume 19, Issue 2, 2025, Pages 19-26]
  • Kord Tamandani, Yahya Performance analysis of parallel sorting algorithms Using Message Passing Interface (MPI) [Volume 19, Issue 1, 2025, Pages 7-16]
  • Krishnamoorthy, Kiruthika Syllable based ASR system for isolated Tamil words using fuzzy based neural network [Volume 19, Issue 2, 2025, Pages 11-18]
  • Kusedghi, Amir Multi-criteria reactive approach for joint dynamic VNF load balancing and service auto-scaling in NFV [Volume 18, Issue 1, 2020, Pages 1-12]
L
  • Labafniya, Mansoureh An Efficient OHR Subtractor Circuit [Volume 7, Issue 2, 2010]
  • Lombardi, Fabrizio Using Error Compensation for Defect Tolerance of Nano-Systems* [Volume 6, Issue 2, 2009]
  • Lucas, Caro Learning Cluster Type and Dissimilarity Metric for Each Cluster Using a Set of Possible Cluster Types [Volume 5, Issue 2, 2008]
M
  • Maabi, Somayeh A Low-Power Hierarchical FinFET-Based SRAM [Volume 13, Issue 2, 2016]
  • Maghfoori Farsangi, Malihe Binary Particle Swarm Optimization: Challenges and new Solutions [Volume 6, Issue 1, 2008]
  • Maghsoudloo, Mohammad On-Line Control Flow Error Detection and Correction Based on Monitoring Both Data-Flow and Control-Flow Graphs [Volume 10, Issue 2, 2013]
  • Mahabadi, Aminollah Multi-Level Fixed-Outline Floorplanning Using Convex Optimization [Volume 13, Issue 1, 2015]
  • Mahabadi, Aminollah A Novel Homogenous Bus Rapid Transit Model Using Hybrid Petri Nets [Volume 14, Issue 1, 2016]
  • Mahabadi, Aminollah Recognition of Persian Handwritten Digit using Fuzzy Logic [Volume 4, Issue 1, 2006]
  • Mahabadi, Aminollah Intelligent Traffic Light [Volume 6, Issue 3, 2008]
  • Mahabadi, Aminollah Reliable License Plate Recognition [Volume 7, Issue 2, 2010]
  • Mahdavi, Mehregan A Distributed Method for Preventing Wormhole Attacks in Wireless Sensor Networks [Volume 8, Issue 2, 2011]
  • Mahdavi-Amiri, Nezam A Local Optimal Method for Multiresolution Smooth Models [Volume 1, Issue 1, 2003]
  • Mahdavi-Amiri, Nezam Finding All the Upper Boundary Points of a Stochastic-Flow Network with Budget Constraints [Volume 8, Issue 2, 2011]
  • Mahdavinataj, Hami Online Visual Object Tracking Using Incremental Discriminative Color Learning [Volume 12, Issue 2, 2015]
  • Mahdi Arzani, Mohammad A Deep Learning Method to Estimate 3D Point of Regard by Joint Head and Eye Information [Volume 13, Issue 2, 2016]
  • Mahdi Sajjadi, Sayyed Extending the Constraint Solving Method for Analysis of Security Protocols with Commutative Encryption [Volume 10, Issue 1, 2012]
  • Mahdisoltani, Farzane HiSeg: Unfolding of Segment Hierarchies in Color Images [Volume 8, Issue 2, 2011]
  • Mahjoubi, Masoud Novel ternary multipliers improved in size and performance based on carbon nanotube transistor [Volume 19, Issue 1, 2025, Pages 54-60]
  • Mahmoud Anisheh, Seyed A Two-Stage Method for Optimizing the Parameters of CMOS Operational Amplifiers Based on Evolutionary Algorithm [Volume 14, Issue 2, 2017]
  • Mahmoudi, Mostafa An Improvement of Shuffled Frog Leaping Algorithm with a Decision Tree for Feature Selection in Text Document Classification [Volume 16, Issue 1, 2018]
  • Mahramian, Mehran A New Algorithm for Guaranteed Delay in DiffServ Architecture [Volume 5, Issue 2, 2008]
  • Makki, S.M. Subband Beamforming of Miniature Microphone Arrays for Audio Applications* [Volume 3, Issue 2, 2006]
  • Maleki, Davood Design of an Artificial Evolutionary Fuzzy Immune System for Computer Network Security [Volume 3, Issue 3, 2005]
  • Manini, Monalisa Pradhan A Review on Classification and Future Extraction Techniques for EEG Signal Processing [Volume 19, Issue 1, 2025, Pages 1-6]
  • Manochehri, Kooroush Novel ternary multipliers improved in size and performance based on carbon nanotube transistor [Volume 19, Issue 1, 2025, Pages 54-60]
  • Manochehri Kalantari, Kooroush Improved RNS for RSA Hardware Implementation [Volume 2, Issue 2, 2005]
  • Mansoorizadeh, Muharram An Expert System for Emotion Recognition from Face Image Sequences [Volume 4, Issue 1, 2006]
  • Mansour Pezeshk, Amir Real-time Watermarking MP3-Compressed Audio [Volume 5, Issue 3, 2007]
  • Mansub Bassiri, Maisam Performance Evaluation of Reusing Based Scheduling in On-line Reconfigurable Computing Systems [Volume 11, Issue 2, 2014]
  • Manzuri-Shalmani, M.T. Subband Beamforming of Miniature Microphone Arrays for Audio Applications* [Volume 3, Issue 2, 2006]
  • Mashinchi, Mashaallah Solving Large Instances Symmetric Traveling Salesman Problem by a Hybrid Discrete Gravitational Search Algorithm [Volume 9, Issue 1, 2011]
  • Mashreghian Arani, Zahra Using Error Compensation for Defect Tolerance of Nano-Systems* [Volume 6, Issue 2, 2009]
  • Masoud Bidgoli, Amir Fuzzy Base Queuing and Compared it with Differentiated Services Random Early Detection [Volume 7, Issue 1, 2009]
  • Masoud Rahmani, Amir Fuzzy Base Queuing and Compared it with Differentiated Services Random Early Detection [Volume 7, Issue 1, 2009]
  • Masoumi, Behrooz A Hybrid Model Based on Reinforcement Learning and Case Base Reasoning to Increase Performance of Multi Agent Systems [Volume 11, Issue 1, 2013]
  • Masoumi, Masoud Protection of the AES Algorithm Against Differential Power Analysis by Using Randomization in Composite Fields [Volume 8, Issue 1, 2010]
  • Matinkia, Mohammadjavad Topology-Aware Graph Signal Sampling for Pooling in Graph Neural Networks [Volume 18, Issue 1, 2020, Pages 54-62]
  • M. Charkari, Nasrollah An Expert System for Emotion Recognition from Face Image Sequences [Volume 4, Issue 1, 2006]
  • Meghdadi, Masoud Stochastic Spintronic Neuron for Hardware Implementation of Neural Networks [Volume 18, Issue 1, 2020, Pages 13-19]
  • Mehdi Fakhraie, Sied A New Tri-State Based Static Random Access Memory with Improved Write-Ability and Read Stability [Volume 10, Issue 2, 2013]
  • Mehdi Homayounpour, Mohamad FarsBayan: A Farsi Speech Synthesizer based on Unit Selection Method [Volume 5, Issue 1, 2007]
  • Mehdi Homayounpour, Mohammad Farsi Speech Synthesis using Hidden Markov Model and Decision Trees [Volume 2, Issue 1, 2004]
  • Mehdi Homayounpour, Mohammad Speed and Accuracy Improvement in Open Set Speaker Identification [Volume 3, Issue 1, 2005]
  • Mehdi Homayounpour, Mohammad Performance Improvement of Speaker Identification in Noisy Conditions [Volume 3, Issue 3, 2005]
  • Mehdi Homayounpour, Mohammad Automatic Fluency Evaluation Using Speech Processing Applied in CALL [Volume 6, Issue 3, 2008]
  • Mehdi Hosseini-nejad, Seyed A Neural Network Realization of File Transfer Scheduling [Volume 2, Issue 2, 2005]
  • Mehdi Mohtavipour, Seyed Performance Evaluation of Reusing Based Scheduling in On-line Reconfigurable Computing Systems [Volume 11, Issue 2, 2014]
  • Mehdipour, Farhad A Similarity-Based Framework for Integrated Temporal Partitioning and Physical Design of Reconfigurable Computing Systems [Volume 3, Issue 3, 2005]
  • Mehdipour, Farhad A Reconfigurable Architecture for Implementing Multiple Cipher Algorithms [Volume 5, Issue 2, 2008]
  • Mehri, Saeedeh A Toolkit for Data Cloud Simulation with the Capability of Replica Management: An Extension to CloudSim [Volume 12, Issue 3, 2014]
  • Meraji, Sina Reducing Access Time in an Object-Oriented ASIP by Splitting Cache Memory [Volume 4, Issue 3, 2006]
  • Mesrikhani, Amir Progressive sorting in the external memory model [Volume 15, Issue 2, 2018]
  • Mesrikhani, Amir On The Spread of a Uniformly Distributed Point Set [Volume 17, Issue 1, 2019]
  • Minaei, Behrouz Approaches to implementing the lean methodology in software development: A survey [Volume 18, Issue 2, 2021, Pages 41-52]
  • Mirian-Hosseinabadi, Seyed-Hassan Evolutionary Relational Database Schema Design Based on Software Measurement [Volume 4, Issue 1, 2006]
  • Mirsoleimani, Ali Effective, Fast and Load Balance Grid Scheduling with A Novel Ant Algorithm [Volume 12, Issue 1, 2014]
  • Mirzababaei, Sajad Volume-Enhanced Stock Price Forecasting: Multivariate Approach with Large Language Models [Volume 19, Issue 2, 2025, Pages 1-10]
  • Mirzaei, Faezeh Designing an Online Face Recognition System using Graphics Processor [Volume 12, Issue 3, 2014]
  • Mirzaei, Mohammad Reducing the Effects of Parameters Variability in Network-on-Chip Using A Variation-Aware Approach [Volume 12, Issue 1, 2014]
  • Mirzaei, Sayeh A Semantic-based Feature Extraction Method Using Categorical Clustering for Persian Document Classification [Volume 18, Issue 1, 2020, Pages 28-35]
  • Mittal, Ragini Performance Analysis in Double Layer Cellular Network with New Call Bounding Scheme and Directed Retry [Volume 9, Issue 2, 2012]
  • Modiri, Nasser Surveying Some Roadmaps for Adoption Service Oriented Architecture [Volume 8, Issue 1, 2010]
  • Moeini, Ali Surveying Some Roadmaps for Adoption Service Oriented Architecture [Volume 8, Issue 1, 2010]
  • Moghadam Charkari, Nasrollah A Two-Phase Method for Solving the Multiple Instance Learning Problem [Volume 5, Issue 3, 2007]
  • Moghaddam, Majid FinFET Based Level Converter for Multi-VDD System Design [Volume 14, Issue 1, 2016]
  • Moghaddam Charkari, Nasrollah Face Verification Using Improved One-dimensional Hidden Markov Model [Volume 1, Issue 2, 2003]
  • Mohades Khorasani, Ali The Illumination of Polygonal Regions with Modems [Volume 8, Issue 2, 2011]
  • Mohaghar, Ali New Goal-Oriented Approach to Assess Main Virtual Organization’s Elements Integrated with Model-Based Methods [Volume 20, Issue 1, 2026, Pages 1-8]
  • Mohamadi, Sudabeh Using Semantic Graph for Automatic Key Concept Extraction [Volume 17, Issue 1, 2019]
  • Mohammad Baloochzahi, Nik Internet Packet Classification Using Prefix-Based Bitmap Intersection [Volume 3, Issue 1, 2005]
  • Mohammadi, Majid Approximate Carry Save Adders Lead to an Efficient Implementation of Low-latency Two-Dimensional Gaussian Smoothing Filter [Volume 19, Issue 1, 2025, Pages 17-24]
  • Mohammadi, Siamak Reducing the Effects of Parameters Variability in Network-on-Chip Using A Variation-Aware Approach [Volume 12, Issue 1, 2014]
  • Mohammad-Khani, Gholam-Reza A Distributed Area Based Method for WSN Localization [Volume 14, Issue 2, 2017]
  • Mohammad Khanli, Leila Grid-JQA: A New Method for Matching in Grid Environment [Volume 4, Issue 2, 2007]
  • Mohammad Rahmati, Nejad Writer Identification Based on Farsi Handwritten Text Using Texture Analysis [Volume 5, Issue 1, 2007]
  • Mohammad Reza Mirzababaei, Seyed A Genetic Algorithm for Scheduling Grids with Hierarchical Architecture [Volume 7, Issue 1, 2009]
  • MohammadReza Mirzababaei, Sayyed Performance Criteria Evaluation for Network Computation Management by Mobile Agents [Volume 10, Issue 1, 2012]
  • Mohammad Zadeh Lajevardi, Amir ‫‍‍ Semi-Automated Entity, Goals Model, and Business Process Model Driven Service Identification [Volume 11, Issue 3, 2013]
  • Mohammad Zarei, Ali RF Resource Planning in Application Specific Integrated Circuits to Improve Timing Closure [Volume 9, Issue 2, 2012]
  • Mohaqeqi, Morteza Temperature-Aware Speed Scheduling in Periodic Real-Time Systems [Volume 12, Issue 2, 2015]
  • Mohsen Mirhosseini, Seyyed The Construction of Fuzzy Classification Systems Using the Shuffled Frog Leaping Algorithm [Volume 15, Issue 2, 2018]
  • Mohsen Pedram, Mir A Multi-View Group Recommender System based on Trust and Ratings [Volume 18, Issue 2, 2021, Pages 32-40]
  • Mojtaba Dehnavi, Seyed Protection of the AES Algorithm Against Differential Power Analysis by Using Randomization in Composite Fields [Volume 8, Issue 1, 2010]
  • Mojtaba Matinkhah, S. Unmanned Aerial vehicles Analysis to Social Networks Performance [Volume 18, Issue 2, 2021, Pages 24-31]
  • Monkaresi, Hamed Two-Way Intelligent Trust Management Using Machine Learning and Subjective Logic in FOG [Volume 20, Issue 1, 2026, Pages 78-88]
  • Monsefi, Reza An Energy-Efficient Asynchronous Multichannel MAC Protocol for Wireless Sensor Networks [Volume 9, Issue 1, 2011]
  • Montazeri, A Automatic diagnosis of retinal diseases using a new method in Deep Dictionary Learning on OCT images [Volume 19, Issue 2, 2025, Pages 39-44]
  • Moradabadi, Behnaz An Adaptive Clustering Based Bayesian Optimization Algorithm for Continuous Optimization [Volume 9, Issue 1, 2011]
  • Moradi, Amir From Fault Tolerance to Fault Attack Tolerance in the Implementations of Advanced Encryption Standard [Volume 4, Issue 2, 2007]
  • Mortazavi, Saeid-Allah C-W-FCM: Constrained Weighted Fuzzy Clustering Algorithm with a Semi-Supervised Approach for Text Classification [Volume 16, Issue 2, 2019]
  • Morteza Mirbostani, Seyed A Distributed Method for Preventing Wormhole Attacks in Wireless Sensor Networks [Volume 8, Issue 2, 2011]
  • Mosaffa, Mahdi Reducing the Effects of Parameters Variability in Network-on-Chip Using A Variation-Aware Approach [Volume 12, Issue 1, 2014]
  • Mostafa Mousavi, Seyyed Farsi Speech Synthesis using Hidden Markov Model and Decision Trees [Volume 2, Issue 1, 2004]
  • Motameni, Homayun A Novel approach for the Navigation Issues using Soft Computing [Volume 19, Issue 2, 2025, Pages 52-65]
  • Movaghar, Ali A Toolkit for Data Cloud Simulation with the Capability of Replica Management: An Extension to CloudSim [Volume 12, Issue 3, 2014]
  • Movaghar, Ali Comparison of Cloud Federation Models with Selfish Cloud Service Providers [Volume 16, Issue 1, 2018]
  • Movaghar, Ali Formal Modeling Routing Protocols in Mobile Ad Hoc Networks [Volume 5, Issue 2, 2008]
  • Movaghar rahimabadi, Ali An Efficient Model Checking Algorithm for a Fragment of μ-Calculus [Volume 3, Issue 3, 2005]
  • Movaghar Rahimabadi, Ali Improving Tora Routing Protocol in MANETs using ANT Colony Algorithm [Volume 8, Issue 1, 2010]
  • Mowlaee Begzade Mahale, Pejman Improving Convergence of the PNLMS Algorithm in Sparse Echo Cancellation using SVS-PNLMS Algorithm [Volume 5, Issue 1, 2007]
  • Mozayani, Nasser Fingerprint Partial Matching using a Minutiae-based Combined Feature [Volume 6, Issue 1, 2008]
  • M. Yaghini, Pooria K2Router: A Low-Power and High-Performance Router Design for Networks-On-Chip [Volume 7, Issue 2, 2010]
N
  • Naderan, Marjan C-W-FCM: Constrained Weighted Fuzzy Clustering Algorithm with a Semi-Supervised Approach for Text Classification [Volume 16, Issue 2, 2019]
  • Naderi, Majid MFTS Algorithm for Identification of Pulse Trains in ESM Systems [Volume 2, Issue 1, 2004]
  • Naderi, Mohsen Using Standard HDLs and CAD Tools for the Design and Simulation of Asynchronous Circuits [Volume 1, Issue 4, 2004]
  • Naderi, Shaghayegh Face Verification Using Improved One-dimensional Hidden Markov Model [Volume 1, Issue 2, 2003]
  • Nadjar Araabi, Babak A Study on the Role of Exploration in Multiagent Reinforcement Learning Considering Task Type [Volume 3, Issue 3, 2005]
  • Nadjar Araabi, Babak Learning Cluster Type and Dissimilarity Metric for Each Cluster Using a Set of Possible Cluster Types [Volume 5, Issue 2, 2008]
  • NADRE PILEHROUD, M Investigating the sources of receiving news when the internet is cut off in Iran and its consequences [Volume 19, Issue 2, 2025, Pages 76-87]
  • Nafari, Kaveh Computer Based System for Development and Improvement of Code of Ethics with Success Evaluation Capability [Volume 11, Issue 1, 2013]
  • Nakhaei, Khadijeh Distributed and Scalable Trust Model in Wireless Sensor Networks and Its Analysis and Performance Evaluation [Volume 7, Issue 1, 2009]
  • Namnabat, Majid FarsBayan: A Farsi Speech Synthesizer based on Unit Selection Method [Volume 5, Issue 1, 2007]
  • Naseri, Ali Proposing An Algorithm for the Process Section of ELINT and ESM Radar Identification Systems [Volume 10, Issue 1, 2012]
  • Naseri, Ali MFTS Algorithm for Identification of Pulse Trains in ESM Systems [Volume 2, Issue 1, 2004]
  • Nasersharif, Babak Robust Speech Recognition Based on Mapping Noisy Features to Clean Features [Volume 1, Issue 4, 2004]
  • Nasesharif, Babak Speech Enhancement Using Two New Filters Based on a Posteriori Probability Distribution of Wavelet Coefficients [Volume 6, Issue 3, 2008]
  • Navi, Keivan An Ultra-Efficient Imprecise Adder for Approximate Computing Based on CNTFET [Volume 13, Issue 1, 2015]
  • Navi, Keivan Novel Quaternary Operator for Cyclic Redundancy Check on Xilinx FPGAs [Volume 14, Issue 1, 2016]
  • Navi, Keivan Implementation of Efficient Modulo 2n+1 Squarer for {2n-1, 2n, 2n+1} Based Residue Number System [Volume 14, Issue 2, 2017]
  • Navi, Keivan Novel Designs of Fast Parity-Preserving Reversible Vedic Multiplier [Volume 17, Issue 1, 2019]
  • Navi, Keivan Efficient Symmetrical Imprecise 1-Bit Full Adder Cells Using CNFET Technology for Image Processing Applications [Volume 17, Issue 2, 2020, Pages 46-61]
  • Navi, Keivan Very High Speed Current-Mode Logical Gates [Volume 3, Issue 1, 2005]
  • Navi, Keivan A High Speed Mixed Mode 4:2 Compressor [Volume 4, Issue 3, 2006]
  • Navi, Keivan A Novel Methodology for Timing Behavior Recognition of Balanced XOR-XNOR Circuits [Volume 5, Issue 3, 2007]
  • Navi, Keyvan Design of 4-2 compressor with 2's complement capability [Volume 4, Issue 1, 2006]
  • Nazarian Naaini, Marjan Extendening a Temporal Query Language for Supporting Imprecise Data [Volume 2, Issue 1, 2004]
  • Nazerzadeh, Hamid RAQ: A Range-Queriable Distributed Data Structure [Volume 6, Issue 2, 2009]
  • Nejadgholi, Isar Nonlinear Enhancement of Noisy Speech Using Dynamic Attractors in Neural Networks [Volume 6, Issue 1, 2008]
  • Nejati, Saeed A Modulo (2^n)+1 Multiplier with Faithful Representation of Residues [Volume 7, Issue 2, 2010]
  • Nematbakhsh, Naser Proposing An Improved Approach Based on Semantic Analysis to Access Information in Social Network [Volume 12, Issue 1, 2014]
  • Neshatian, Koorosh Ontology-based Question Answering System for Telecommunications with Document Extraction & Classification Abilities [Volume 2, Issue 1, 2004]
  • Nezamabadi-pour, Hossein Combining Low-level Features for Semantic Image Classification [Volume 2, Issue 1, 2004]
  • Nezamabadi-pour, Hossein A New Method for Color Image Indexing Based on Compression and Mathematical Morphology [Volume 3, Issue 3, 2005]
  • Nezamabadi-pour, Hossein Binary Particle Swarm Optimization: Challenges and new Solutions [Volume 6, Issue 1, 2008]
  • Nezamabadi-pour, Hossein Solving Large Instances Symmetric Traveling Salesman Problem by a Hybrid Discrete Gravitational Search Algorithm [Volume 9, Issue 1, 2011]
  • Nezamabadi-pour, Hossein Evaluating the Efficacy of Different Hierarchical Clustering Method in Image Retrieval using Multi-Query Method [Volume 9, Issue 1, 2011]
  • Nikoubin, Tooraj A Novel Methodology for Timing Behavior Recognition of Balanced XOR-XNOR Circuits [Volume 5, Issue 3, 2007]
  • Nilforoushan, Zahra A Java Pattern for File Uploading [Volume 8, Issue 2, 2011]
  • Nili Ahmadabadi, Majid A Study on the Role of Exploration in Multiagent Reinforcement Learning Considering Task Type [Volume 3, Issue 3, 2005]
  • Nili Ahmadabadi, Majid Learning Cluster Type and Dissimilarity Metric for Each Cluster Using a Set of Possible Cluster Types [Volume 5, Issue 2, 2008]
  • Noferesti, Samira A New Approach Based on Learning Automata for Solving Steiner Tree Problem [Volume 6, Issue 3, 2008]
  • Nolte, Thomas A Profit-Aware Allocation of High Performance Computing Applications on Distributed Cloud Data Centers with Environmental Considerations [Volume 10, Issue 2, 2013]
  • Noorallahi Romani, Mohammad A Novel Five-Transistor SRAM Cell for High Speed and High Density Applications [Volume 6, Issue 1, 2008]
  • Noori, Hamid A Predictive Task Migration Algorithm with Adaptive Migration Threshold for Dynamic Thermal Management of Multi-Core Processors [Volume 9, Issue 2, 2012]
  • Noormandipour, Reza A Systematic Method for Testing of Bus-Based Communication Structures of Complex Chips [Volume 5, Issue 3, 2007]
  • Noormohammadi, Hojat Feature Selection in Multi-label Classification based on Binary Quantum Gravitational Search Algorithm [Volume 19, Issue 1, 2025, Pages 61-69]
  • Nooshyar, Mehdi Multi-Focus Image Fusion for Visual Sensor Networks in Wavelet Domain [Volume 11, Issue 2, 2014]
  • Noroozi, Mahnaz Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata [Volume 14, Issue 1, 2016]
  • Nosrat Makuee, Farhang Constrained Portfolio Optimization with Neural Network on the Grid [Volume 10, Issue 1, 2012]
  • Nouranizadeh, Amirhossein Topology-Aware Graph Signal Sampling for Pooling in Graph Neural Networks [Volume 18, Issue 1, 2020, Pages 54-62]
  • Nouri, Ali Using Layered GA in Multi-agent Learning [Volume 1, Issue 2, 2003]
O
  • Ould-Khaoua, Mohamed Performance Analysis of Fully Adaptive Routing Algorithms in Wormhole-Switched Interconnect Networks ∗ [Volume 3, Issue 2, 2006]
  • Oveisi, Farid Feature Extraction Using Mutual Information for Classification of Electroencephalogram in Brain Computer Interface [Volume 6, Issue 3, 2008]
P
  • Pakniat, Nasrollah Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata [Volume 14, Issue 1, 2016]
  • Panah, Amir A Novel approach for the Navigation Issues using Soft Computing [Volume 19, Issue 2, 2025, Pages 52-65]
  • Panda, Ganapati Fuzzy Swarm Net (FSN) for Classification in Data Mining [Volume 5, Issue 2, 2008]
  • Parhami, Behrooz Taxonomy and Overview of Distributed Malfunction Diagnosis in Networks of Intelligent Nodes [Volume 13, Issue 2, 2016]
  • Parhami, Behrooz A Comparison-Based Algorithm for Hardware- and SoftwareBased Median-Finding in Signal Processing Applications [Volume 14, Issue 1, 2016]
  • Parhami, Behrooz On Research Quality and Impact: What Five Decades in Academia Has Taught Me [Volume 17, Issue 2, 2020]
  • Parhami, Behrooz A Class of Odd-Radix Chordal Ring Networks [Volume 4, Issue 2, 2007]
  • Parsa, Saeed Learning to Predict Software Testability Axiomatically [Volume 19, Issue 1, 2025, Pages 43-53]
  • Parsa, Saeed ‫‍‍ Semi-Automated Entity, Goals Model, and Business Process Model Driven Service Identification [Volume 11, Issue 3, 2013]
  • Parsaeian, Shilan Microprocessor Dependability Enhancement using Microarchitectural Error Correcting Code for Instructions [Volume 9, Issue 1, 2011]
  • Pasandi, Ghasem A New Tri-State Based Static Random Access Memory with Improved Write-Ability and Read Stability [Volume 10, Issue 2, 2013]
  • Pedram, Hossein A Survey of Successes and hurdles of Asynchronous Circuits Design [Volume 1, Issue 1, 2003]
  • Pedram, Hossein Using Standard HDLs and CAD Tools for the Design and Simulation of Asynchronous Circuits [Volume 1, Issue 4, 2004]
  • Peiravi, Ali Reliability Analysis of Sequential Logic Circuits Using Signal Flow Graphs [Volume 18, Issue 1, 2020, Pages 36-43]
  • Pounaki, Niloufar An Ultra-Efficient Imprecise Adder for Approximate Computing Based on CNTFET [Volume 13, Issue 1, 2015]
  • PourAliAkbar, Ehsan Novel Designs of Fast Parity-Preserving Reversible Vedic Multiplier [Volume 17, Issue 1, 2019]
  • Pourazin, Shahriar Going Meta: Back to the Expectations [Volume 2, Issue 2, 2005]
  • Pourghassem, Hossein Fingerprint Classification Based on Spectral Features [Volume 3, Issue 2, 2006]
  • Pourgholi, Mahdi Nature-inspired and teaching-learning-based methods for improving convergence speed in multi-agent systems [Volume 18, Issue 1, 2020, Pages 54-59]
  • Pourmozafari, Saadat Novel ternary multipliers improved in size and performance based on carbon nanotube transistor [Volume 19, Issue 1, 2025, Pages 54-60]
  • Pour Mozafari, Saadat Improved RNS for RSA Hardware Implementation [Volume 2, Issue 2, 2005]
  • Pourreza, Maryam Data Center Selection Based on Cloud Customers’ Preferences of Quality Attributes for Federated Clouds [Volume 15, Issue 1, 2017]
  • PourRezaee, Kamal Real-time Watermarking MP3-Compressed Audio [Volume 5, Issue 3, 2007]
Q
  • Qasemi, Ehsan A New Tri-State Based Static Random Access Memory with Improved Write-Ability and Read Stability [Volume 10, Issue 2, 2013]
R
  • Rabiee, Nooshin Using deep reinforcement learning networks to provide dynamic scheduling in workplace environments [Volume 20, Issue 1, 2026, Pages 67-77]
  • Radmehr, Mehdi Automatic Analog IC Layout with CNN-Based Placement Using SqueezeNet and Multi-Objective Routing via DE and NSGA-III [(Articles in Press)]
  • Rahgozar, Maseud Ant Colony Approach to Link Prediction in Social Networks [Volume 12, Issue 1, 2014]
  • Rahman, Arash Complex Systems Analysis in Artificial Life Based on Sugarscape Model [Volume 7, Issue 1, 2009]
  • Rahmani, Mahsa A Reconfigurable, Pipeline Decimal Multiplier [Volume 13, Issue 1, 2015]
  • Rahmani, Mohsen Robust Speech Recognition Based on Mapping Noisy Features to Clean Features [Volume 1, Issue 4, 2004]
  • Rahmani, Parisa Channel allocation using Learning Automata in Cognitive Radio Networks [Volume 16, Issue 1, 2018]
  • Rahmati, Mohammad Topology-Aware Graph Signal Sampling for Pooling in Graph Neural Networks [Volume 18, Issue 1, 2020, Pages 54-62]
  • Rajabi, Aboozar A Profit-Aware Allocation of High Performance Computing Applications on Distributed Cloud Data Centers with Environmental Considerations [Volume 10, Issue 2, 2013]
  • Rajabzadeh, Amir Microprocessor Dependability Enhancement using Microarchitectural Error Correcting Code for Instructions [Volume 9, Issue 1, 2011]
  • Ramezani, Hadise Approximate Carry Save Adders Lead to an Efficient Implementation of Low-latency Two-Dimensional Gaussian Smoothing Filter [Volume 19, Issue 1, 2025, Pages 17-24]
  • Ramezani Pour, Soheila C-W-FCM: Constrained Weighted Fuzzy Clustering Algorithm with a Semi-Supervised Approach for Text Classification [Volume 16, Issue 2, 2019]
  • Ramtin, Amirreza Self-Stabilizing Virtual Backbone Construction in Selfish Wireless Ad-Hoc Networks [Volume 10, Issue 2, 2013]
  • Ranjbar, Akbar Reliable License Plate Recognition [Volume 7, Issue 2, 2010]
  • Ranjbar, Maryam Enhance the efficiency of rate-control in VVC standard using the characteristics of human visual system [Volume 19, Issue 2, 2025, Pages 27-32]
  • Rao Akepogu, Ananda Empirical Approach for Optimising Cumulative Network Lifetime in WSN with Hierarchical Clustering Technique Based on Fuzzy Logic [Volume 12, Issue 2, 2015]
  • Rasoolzadegan, Abbas E[X]-SJF[EsTLA]: A New Intelligent Rule Scheduling Approach in Active Database Systems [Volume 6, Issue 2, 2009]
  • Rastgar Fatemi, Seyed Mahmoud Jalal Performance Improvement of CIGS Thin-Film Solar Cells by Incorporating an ITO Photoanode and Designing a Structured Back Layer [Volume 20, Issue 1, 2026, Pages 9-26]
  • Ravanbakhsh, Hadi An Energy-Optimal Real-Time Scheduling Algorithm for Unrelated DVS-Enabled Parallel Machines [Volume 13, Issue 2, 2016]
  • Razazan, Hadieh Speed and Accuracy Improvement in Open Set Speaker Identification [Volume 3, Issue 1, 2005]
  • Razzazi, Farbod Acoustic Modeling of Speech Units Using GVQ Probability Density Representation [Volume 1, Issue 3, 2003]
  • Reshadi, Midia Novel Designs of Fast Parity-Preserving Reversible Vedic Multiplier [Volume 17, Issue 1, 2019]
  • Reshadi, Midia Efficient Symmetrical Imprecise 1-Bit Full Adder Cells Using CNFET Technology for Image Processing Applications [Volume 17, Issue 2, 2020, Pages 46-61]
  • Reza Ahmadifar, Hamid A Similarity-Based Framework for Integrated Temporal Partitioning and Physical Design of Reconfigurable Computing Systems [Volume 3, Issue 3, 2005]
  • Reza Akbarzade Totonchi, Mohammad Design of an Artificial Evolutionary Fuzzy Immune System for Computer Network Security [Volume 3, Issue 3, 2005]
  • Reza Ayatollahzadeh Shirazi, Mohammad Flexibility in Negotiation Systems: An Argumentation-based Approach [Volume 3, Issue 2, 2006]
  • Rezaeieh, Amir A Novel Approach to Improve Rate-Distortion-Complexity in Versatile Video Coding Standard [Volume 18, Issue 1, 2020, Pages 20-27]
  • Reza Faragardi, Hamid A Profit-Aware Allocation of High Performance Computing Applications on Distributed Cloud Data Centers with Environmental Considerations [Volume 10, Issue 2, 2013]
  • Reza Hejzai, Mahmood Ontology-based Question Answering System for Telecommunications with Document Extraction & Classification Abilities [Volume 2, Issue 1, 2004]
  • Reza Kayvanpour, Mohammad A Two-Phase Method for Solving the Multiple Instance Learning Problem [Volume 5, Issue 3, 2007]
  • Reza Meybodi, Mohammad Complete Binary Search Mesh: A Concurrent Data Structure for Distributed Memory Parallel Computers [Volume 1, Issue 1, 2003]
  • Reza Meybodi, Mohammad User Based Call Admission Control Policies for Cellular Mobile Systems: A Survey I [Volume 1, Issue 2, 2003]
  • Reza Meybodi, Mohammad Open Synchronous Cellular Learning Automata [Volume 1, Issue 4, 2004]
  • Reza Meybodi, Mohammad A Hybrid Model Based on Reinforcement Learning and Case Base Reasoning to Increase Performance of Multi Agent Systems [Volume 11, Issue 1, 2013]
  • Reza Meybodi, Mohammad Solving Moving Peaks Problem Using Memetic Algorithm Based on Fuzzy Particle Swarm Optimization [Volume 11, Issue 3, 2013]
  • Reza Meybodi, Mohammad Using Learning Automaton to Thwart Selective Forwarding Attack in Wireless Sensor Networks [Volume 11, Issue 3, 2013]
  • Reza Meybodi, Mohammad E[X]-SJF[EsTLA]: A New Intelligent Rule Scheduling Approach in Active Database Systems [Volume 6, Issue 2, 2009]
  • Reza Meybodi, Mohammad A New Approach Based on Learning Automata for Solving Steiner Tree Problem [Volume 6, Issue 3, 2008]
  • Reza Ofoghi, Bahador Ontology-based Question Answering System for Telecommunications with Document Extraction & Classification Abilities [Volume 2, Issue 1, 2004]
  • Reza Shahriari, Hamid An Incentive Mechanism for Collaborative Networks using Random Matching Game [Volume 9, Issue 1, 2011]
  • Reza Taesiri, Mohammad A Video Game Testing Method Utilizing Deep Learning [Volume 17, Issue 2, 2020]
  • Reza Vaezi Joze, Hamid A New Architecture for Multi Agent System in Rescue Simulation Environment [Volume 3, Issue 2, 2006]
  • Reza Yazdchi, Mohammad Improvement of Speech Recognition Using Combination of Lexical Knowledge with Feature Parameters [Volume 3, Issue 3, 2005]
  • Rezazad, Mostafa A Routing Algorithm for the Star Interconnection Network in the Presence of Faults* [Volume 1, Issue 4, 2004]
  • Rezvanian, Alireza Solving Moving Peaks Problem Using Memetic Algorithm Based on Fuzzy Particle Swarm Optimization [Volume 11, Issue 3, 2013]
  • Riahi, Noushin Synthetic ECG signal generation, a review [Volume 19, Issue 1, 2025, Pages 25-36]
  • Riahi, Talayeh DiMAS: A Micro-service based Approach to Create Distributed Agent-based Simulations [Volume 19, Issue 1, 2025, Pages 70-86]
  • Roodaki, Hoda Enhance the efficiency of rate-control in VVC standard using the characteristics of human visual system [Volume 19, Issue 2, 2025, Pages 27-32]
  • Roodaki, Hoda A Parallel Architecture for Motion Estimation in HEVC Encoder [Volume 15, Issue 2, 2018]
  • Roodaki, Hoda A Novel Approach to Improve Rate-Distortion-Complexity in Versatile Video Coding Standard [Volume 18, Issue 1, 2020, Pages 20-27]
  • Rostami, Sanaz MetaRecall: An Ensemble Classifier with Dynamic Base Classifier Selection and Ordering [Volume 20, Issue 1, 2026, Pages 98-112]
  • Rostami Shahrbabaki, Majid Binary Particle Swarm Optimization: Challenges and new Solutions [Volume 6, Issue 1, 2008]
  • Rouzbahani, Amin Evolutionary Relational Database Schema Design Based on Software Measurement [Volume 4, Issue 1, 2006]
  • R.Poursafaei, Farimah AdDQ: Low-Energy Hardware Replication for Real-Time Systems through Adaptive Dual-Queue Scheduling [Volume 15, Issue 1, 2017]
  • R. Zarandi, Hamid On-Line Control Flow Error Detection and Correction Based on Monitoring Both Data-Flow and Control-Flow Graphs [Volume 10, Issue 2, 2013]
  • R. Zarandi, Hamid K2Router: A Low-Power and High-Performance Router Design for Networks-On-Chip [Volume 7, Issue 2, 2010]
S
  • Sabbagh Molahosseini, Amir Approximate Carry Save Adders Lead to an Efficient Implementation of Low-latency Two-Dimensional Gaussian Smoothing Filter [Volume 19, Issue 1, 2025, Pages 17-24]
  • Sadat Gohari, Faezeh Improving Recommender Systems Using Context-Dependent Trust Relationships [Volume 16, Issue 1, 2018]
  • Sadat Masoud, Melika Multi-input DNA-based Logic Gates for Profiling the MicroRNA Biomarkers of Hepatitis-C Viral Infection [Volume 18, Issue 2, 2021, Pages 16-23]
  • Sadat Mirian, Maryam Ontology-based Question Answering System for Telecommunications with Document Extraction & Classification Abilities [Volume 2, Issue 1, 2004]
  • Sadat Mousavi, Samane Design of Local Rule for Cellular Automata Using Evolutionary Algorithms [Volume 7, Issue 1, 2009]
  • Sadeghi, Hadi Reducing Access Time in an Object-Oriented ASIP by Splitting Cache Memory [Volume 4, Issue 3, 2006]
  • Sadeghi, Mahmoud Performance Criteria Evaluation for Network Computation Management by Mobile Agents [Volume 10, Issue 1, 2012]
  • Sadeghi, Maryam A Multi-View Group Recommender System based on Trust and Ratings [Volume 18, Issue 2, 2021, Pages 32-40]
  • Sadeghiyan, Babak Improved RNS for RSA Hardware Implementation [Volume 2, Issue 2, 2005]
  • Sadeghiyan, Babak Timing Attack Against Blakley’s Modular Multiplication Algorithm [Volume 4, Issue 3, 2006]
  • Sadeghiyan, Babak A Reconfigurable Architecture for Implementing Multiple Cipher Algorithms [Volume 5, Issue 2, 2008]
  • Sadegh Sadeghi, Mohammad A Non-interference Isolation Mapping to Eliminate Timing Channel Attacks [Volume 16, Issue 2, 2019]
  • Safabakhsh, Reza Object Tracking in an Image Sequence [Volume 1, Issue 3, 2003]
  • Safaei, Farshad Performance Analysis of Fully Adaptive Routing Algorithms in Wormhole-Switched Interconnect Networks ∗ [Volume 3, Issue 2, 2006]
  • Safaei, Farshad Deadlock-Free Path-Based Fault-Tolerant Multicast Communications on 2-D Mesh Networks-on-Chip [Volume 6, Issue 2, 2009]
  • Safari, Mojtaba Improving Tora Routing Protocol in MANETs using ANT Colony Algorithm [Volume 8, Issue 1, 2010]
  • Safari, Saeed A New Register Allocation Method For Testability Improvement [Volume 1, Issue 3, 2003]
  • Safari, Sepideh AdDQ: Low-Energy Hardware Replication for Real-Time Systems through Adaptive Dual-Queue Scheduling [Volume 15, Issue 1, 2017]
  • Safari, Sepideh Energy-Budget-Aware Reliability Management in Multi-Core Embedded Systems with Hybrid Energy Source [Volume 15, Issue 2, 2018]
  • Safarpour, Mostafa Effective, Fast and Load Balance Grid Scheduling with A Novel Ant Algorithm [Volume 12, Issue 1, 2014]
  • Sahafizadeh, Ebrahim Comparing Time-Series Analysis Approaches Utilized in Research Papers to Forecast COVID-19 Cases in Africa: A Literature Review [Volume 20, Issue 1, 2026, Pages 27-37]
  • Saheb Zamani, Morteza A Specification-Driven Framework for the Floorplanning and Placement of Hierarchical VLSI Designs [Volume 1, Issue 2, 2003]
  • Saheb Zamani, Morteza A Fast Hardware Implementation of STON Algorithm for Comparing 3-D Structure of Proteins in FPGA [Volume 13, Issue 1, 2015]
  • Saheb Zamani, Morteza A Similarity-Based Framework for Integrated Temporal Partitioning and Physical Design of Reconfigurable Computing Systems [Volume 3, Issue 3, 2005]
  • Saheb Zamani, Morteza A Reconfigurable Architecture for Implementing Multiple Cipher Algorithms [Volume 5, Issue 2, 2008]
  • Saheb Zamani, Morteza Efficient Buffer Resource Distribution by Buffer Planning in Floorplanning Level to Improve Buffer Usage and Routing Congestion [Volume 5, Issue 3, 2007]
  • Sahjari, Mehdi Analysis of incentive mechanism in Repchain [Volume 19, Issue 2, 2025, Pages 33-38]
  • Saifhashemi, Arash Using Standard HDLs and CAD Tools for the Design and Simulation of Asynchronous Circuits [Volume 1, Issue 4, 2004]
  • Saket, Tohid Routing Data Using Discrete Particle Aggregation on the Internet of Thing [Volume 19, Issue 1, 2025, Pages 107-111]
  • Salami, Bagher A Predictive Task Migration Algorithm with Adaptive Migration Threshold for Dynamic Thermal Management of Multi-Core Processors [Volume 9, Issue 2, 2012]
  • Salamzadeh, Azadeh An Improved Back-Propagation with PSO in MLP-ANNs for Authorship Identification [Volume 17, Issue 1, 2019]
  • Salehi, Mohammad AdDQ: Low-Energy Hardware Replication for Real-Time Systems through Adaptive Dual-Queue Scheduling [Volume 15, Issue 1, 2017]
  • Salehi, Mohammad Energy-Budget-Aware Reliability Management in Multi-Core Embedded Systems with Hybrid Energy Source [Volume 15, Issue 2, 2018]
  • Salehi Najaf-abadi, Amineh Some Suggestions to Enhance the Performance of SSL Handshake Protocol [Volume 7, Issue 1, 2009]
  • Salimifard, Zahra Using deep reinforcement learning networks to provide dynamic scheduling in workplace environments [Volume 20, Issue 1, 2026, Pages 67-77]
  • Salmasizadeh, Mahmoud From Fault Tolerance to Fault Attack Tolerance in the Implementations of Advanced Encryption Standard [Volume 4, Issue 2, 2007]
  • Samavi, Shadrokh Processing and Compression of Microarray Images by Pipelining [Volume 1, Issue 3, 2003]
  • Sam Daliri, Mahya Novel Quaternary Operator for Cyclic Redundancy Check on Xilinx FPGAs [Volume 14, Issue 1, 2016]
  • Sam Daliri, Saeed Novel Quaternary Operator for Cyclic Redundancy Check on Xilinx FPGAs [Volume 14, Issue 1, 2016]
  • Sameti, Hossein Spectral Modeling Based on Gaussian Conditional Random Field for Statistical Parametric Speech Synthesis [Volume 10, Issue 2, 2013]
  • Sami, Ashkan Prediction of Exploit Using Text Mining [Volume 11, Issue 1, 2013]
  • Sanbal, Prabhavathi Empirical Approach for Optimising Cumulative Network Lifetime in WSN with Hierarchical Clustering Technique Based on Fuzzy Logic [Volume 12, Issue 2, 2015]
  • Saniee Abadeh, Mohammad HiSeg: Unfolding of Segment Hierarchies in Color Images [Volume 8, Issue 2, 2011]
  • Sanjabi, Mercedeh Multi-input DNA-based Logic Gates for Profiling the MicroRNA Biomarkers of Hepatitis-C Viral Infection [Volume 18, Issue 2, 2021, Pages 16-23]
  • Sarbazi-Azad, Hamid A Routing Algorithm for the Star Interconnection Network in the Presence of Faults* [Volume 1, Issue 4, 2004]
  • Sarbazi-Azad, Hamid Leveraging HPC Power for Solving Abstract Mathematical Problems [Volume 11, Issue 2, 2014]
  • Sarbazi-Azad, Hamid Editorial Note [Volume 12, Issue 3, 2014]
  • Saremi, Maryam Efficient Modular Binary Signed-Digit Multiplier for the moduli set {(2^n) -1, 2^n, (2^n) +1} [Volume 9, Issue 2, 2012]
  • Sargolzaei Javan, Morteza Performance Evaluation of Hypervisors using HPC Challenge Benchmark Suite [Volume 12, Issue 2, 2015]
  • Sarikhani, Sahar Design of Fuzzy Cognitive Map for Breast Cancer [Volume 19, Issue 2, 2025, Pages 88-92]
  • Sarrafzadeh, Bahareh Ontology Population and Semantic Annotation of Persian Texts in POPTA [Volume 6, Issue 3, 2008]
  • Saryazdi, Saeid A New Method for Color Image Indexing Based on Compression and Mathematical Morphology [Volume 3, Issue 3, 2005]
  • Saryazdi, Saeid Evaluating the Efficacy of Different Hierarchical Clustering Method in Image Retrieval using Multi-Query Method [Volume 9, Issue 1, 2011]
  • Sattari, Mohammad Proposing An Improved Approach Based on Semantic Analysis to Access Information in Social Network [Volume 12, Issue 1, 2014]
  • Sayadiyan, Abolghasem Acoustic Modeling of Speech Units Using GVQ Probability Density Representation [Volume 1, Issue 3, 2003]
  • Sayyah Ensan, Sina A Low-Power Hierarchical FinFET-Based SRAM [Volume 13, Issue 2, 2016]
  • Sedaghatjoo, Zeinab Fully Dispersed Haar-like Filters for Enhanced Facial Feature Extraction and Recognition [Volume 20, Issue 1, 2026, Pages 53-66]
  • Sedighi, Mehdi Improving the Retiming Algorithm to Increase the Clock Speed of Synchronous Circuits [Volume 1, Issue 3, 2003]
  • Sedighi, Mehdi A Reconfigurable, Pipeline Decimal Multiplier [Volume 13, Issue 1, 2015]
  • Sedighi, Mehdi Exploring Reconfigurability Options Among Decimal Adders [Volume 13, Issue 2, 2016]
  • Sedighi, Mehdi A Similarity-Based Framework for Integrated Temporal Partitioning and Physical Design of Reconfigurable Computing Systems [Volume 3, Issue 3, 2005]
  • Setayeshi, Saeed Complex Systems Analysis in Artificial Life Based on Sugarscape Model [Volume 7, Issue 1, 2009]
  • Seyyedi, Mirali New Goal-Oriented Approach to Assess Main Virtual Organization’s Elements Integrated with Model-Based Methods [Volume 20, Issue 1, 2026, Pages 1-8]
  • Shafaei, Hadis Comparative analysis of web visibility using SEO tools and its effect on website improvement [Volume 19, Issue 1, 2025, Pages 93-106]
  • Shafiee, Masoud A New Algorithm for Guaranteed Delay in DiffServ Architecture [Volume 5, Issue 2, 2008]
  • Shafik, Wasswa Unmanned Aerial vehicles Analysis to Social Networks Performance [Volume 18, Issue 2, 2021, Pages 24-31]
  • S. Haghjoo, Mostafa Parallel Processing of Data Stream [Volume 11, Issue 1, 2013]
  • Shahabi, Fateme Writer Identification Based on Farsi Handwritten Text Using Texture Analysis [Volume 5, Issue 1, 2007]
  • Shahab Shahmiri, Amir Poet Identification for Shahnameh of Ferdowsi using Artificial Neural Network [Volume 4, Issue 3, 2006]
  • Shahbazi, Nima Reducing Access Time in an Object-Oriented ASIP by Splitting Cache Memory [Volume 4, Issue 3, 2006]
  • Shahgholian, Azar Towards Persian Text Mining: A Categorisation Approach [Volume 8, Issue 1, 2010]
  • Shahmohammadi, Gholamreza Quantitative Evaluation of Architectural Styles from the Reliability Viewpoint in Safety Critical Software [Volume 6, Issue 3, 2008]
  • Shahram Moin, Mohammad Face Verification Using Improved One-dimensional Hidden Markov Model [Volume 1, Issue 2, 2003]
  • Shahriar Shahhoseini, Hadi Performance Evaluation of Reusing Based Scheduling in On-line Reconfigurable Computing Systems [Volume 11, Issue 2, 2014]
  • Shahriar Shahhoseini, Hadi Distributed and Scalable Trust Model in Wireless Sensor Networks and Its Analysis and Performance Evaluation [Volume 7, Issue 1, 2009]
  • Shams, Fereidoon A New Executable Model of Software Architecture for Performance Evaluation [Volume 7, Issue 1, 2009]
  • Shams Aliee, Fereidoon Improving Recommender Systems Using Context-Dependent Trust Relationships [Volume 16, Issue 1, 2018]
  • Shamsfard, Mehrnoush Verb Detection in Persian Language Sentences [Volume 11, Issue 3, 2013]
  • Shamsfard, Mehrnoush Ontology Population and Semantic Annotation of Persian Texts in POPTA [Volume 6, Issue 3, 2008]
  • Shamsi, M Automatic diagnosis of retinal diseases using a new method in Deep Dictionary Learning on OCT images [Volume 19, Issue 2, 2025, Pages 39-44]
  • Shamsi Goshki, Asma Evaluating the Efficacy of Different Hierarchical Clustering Method in Image Retrieval using Multi-Query Method [Volume 9, Issue 1, 2011]
  • Sharifnavabi, Ebrahim Performance Improvement of Speaker Identification in Noisy Conditions [Volume 3, Issue 3, 2005]
  • Sherkat, Ehsan Ant Colony Approach to Link Prediction in Social Networks [Volume 12, Issue 1, 2014]
  • Shirani, Shahram Processing and Compression of Microarray Images by Pipelining [Volume 1, Issue 3, 2003]
  • Shiry Ghidary, Saeed Poet Identification for Shahnameh of Ferdowsi using Artificial Neural Network [Volume 4, Issue 3, 2006]
  • Shirzadi, Ahmad Fully Dispersed Haar-like Filters for Enhanced Facial Feature Extraction and Recognition [Volume 20, Issue 1, 2026, Pages 53-66]
  • Shjari, Mehdi Analysis of incentive mechanism in Repchain [Volume 19, Issue 1, 2025, Pages 87-92]
  • Shokri, Reza Anonymous Communication in MANETs Using Pseudonymity in Chain-Based Routing [Volume 4, Issue 2, 2007]
  • Shriyare shah Hosseyni, Hadi MFTS Algorithm for Identification of Pulse Trains in ESM Systems [Volume 2, Issue 1, 2004]
  • Soheil Shamaee, Mahsa The Illumination of Polygonal Regions with Modems [Volume 8, Issue 2, 2011]
  • Soleimanian Gharehchopogh, Farhad An Improvement of Shuffled Frog Leaping Algorithm with a Decision Tree for Feature Selection in Text Document Classification [Volume 16, Issue 1, 2018]
  • Soleimanian Gharehchopogh, Farhad An Improved Back-Propagation with PSO in MLP-ANNs for Authorship Identification [Volume 17, Issue 1, 2019]
T
  • Tabibian, Shima Introducing Speech Enhancement Filters in Wavelet Domain [Volume 8, Issue 1, 2010]
  • Taei Zadeh, Ali An Industrial Internet of Things Architecture for Remote Areas [Volume 17, Issue 1, 2019]
  • Taghi Manzuri, Mohammad A Novel Five-Transistor SRAM Cell for High Speed and High Density Applications [Volume 6, Issue 1, 2008]
  • Taghi Manzuri Shalmani, Mohammad A Robust Voice Activity Detection Method for Noisy Speech Signals [Volume 4, Issue 3, 2006]
  • Taghi Manzuri-Shalmani, Mohammad From Fault Tolerance to Fault Attack Tolerance in the Implementations of Advanced Encryption Standard [Volume 4, Issue 2, 2007]
  • Taghi Rouhani Rankoohi, Mohammad Extendening a Temporal Query Language for Supporting Imprecise Data [Volume 2, Issue 1, 2004]
  • Taheri, Hassan An Industrial Internet of Things Architecture for Remote Areas [Volume 17, Issue 1, 2019]
  • Taheri, Hassan A New Algorithm for Guaranteed Delay in DiffServ Architecture [Volume 5, Issue 2, 2008]
  • Tahmasbi, Maryam Orthogonal Thickness of Graphs [Volume 8, Issue 2, 2011]
  • Tao, Sixin Taxonomy and Overview of Distributed Malfunction Diagnosis in Networks of Intelligent Nodes [Volume 13, Issue 2, 2016]
  • Tavakkol, Arash Leveraging HPC Power for Solving Abstract Mathematical Problems [Volume 11, Issue 2, 2014]
  • Teimoori, Shabnam E-Learning Content Evaluation System for Determining the Degree of Concepts Transfer to Learners via Tags Analysis [Volume 11, Issue 3, 2013]
  • Timarchi, Somayeh Efficient Modular Binary Signed-Digit Multiplier for the moduli set {(2^n) -1, 2^n, (2^n) +1} [Volume 9, Issue 2, 2012]
  • Torabi, Shahrzad A Parallel Numerical Solver of CTMCs and Its Implementation on Multi-Core Processors [Volume 9, Issue 1, 2011]
  • Torabi, Zeinab An RNS Comparator via Dynamic Range Partitioning: The Case of {2^n - 1, 2^n, 2^(n+1) -1} [Volume 16, Issue 2, 2019]
  • Torabideh, Peyman Porosity Evaluation Using Artificial Neural Network, Optimized with GA and PSO [Volume 20, Issue 1, 2026, Pages 46-52]
  • Torabideh, Peyman Application of Optimized Artificial Neural Networks for Predicting Reservoir Permeability [(Articles in Press)]
  • Totoni, Ehsan Leveraging HPC Power for Solving Abstract Mathematical Problems [Volume 11, Issue 2, 2014]
V
  • Vafadar, Shiva Research Areas in Agent Oriented Software Engineering (AOSE) [Volume 10, Issue 1, 2012]
  • ValadBeigi, Majed Deadlock-Free Path-Based Fault-Tolerant Multicast Communications on 2-D Mesh Networks-on-Chip [Volume 6, Issue 2, 2009]
  • Valavi, Ehsan Multi-Sensor Fuzzy Data Fusion Using Sensors with Different Characteristics [Volume 16, Issue 2, 2019]
  • Valiollah Fatemi, Seyed A Survey of Successes and hurdles of Asynchronous Circuits Design [Volume 1, Issue 1, 2003]
  • Valizadeh, Ali A Reconfigurable Architecture for Implementing Multiple Cipher Algorithms [Volume 5, Issue 2, 2008]
  • Vazirnezhad, Bahram Automatic Extraction of Pronunciation Rules and Generating Pronunciation Variants of Words to Use in Automatic Continuous Speech Recognition [Volume 3, Issue 3, 2005]
  • Vazirnezhad, Bahram Hybrid statistical static and dynamic pronunciation models designed to be trained by a medium-size corpus [Volume 5, Issue 1, 2007]
W
  • Wu, Nan Taxonomy and Overview of Distributed Malfunction Diagnosis in Networks of Intelligent Nodes [Volume 13, Issue 2, 2016]
Y
  • Yabandeh, Maysam Anonymous Communication in MANETs Using Pseudonymity in Chain-Based Routing [Volume 4, Issue 2, 2007]
  • Yan, Jim Automated Design and Dimensioning of Virtual Networks [Volume 1, Issue 2, 2003]
  • Yazdani, Nasser Anonymous Communication in MANETs Using Pseudonymity in Chain-Based Routing [Volume 4, Issue 2, 2007]
  • Yazdani, Nasser Performance Analysis of Optical Packet-Switched Meshes: Metrics and Modeling [Volume 5, Issue 2, 2008]
  • Yousefi, Saleh Internet Packet Classification Using Prefix-Based Bitmap Intersection [Volume 3, Issue 1, 2005]
  • Yousefi Choubini, Ali Performance Benchmarking of Load Balancers and Service Brokers in Heterogeneous Clouds using CloudAnalyst [Volume 20, Issue 1, 2026, Pages 113-127]
  • Yousef Sanati, Morteza SWIG Workflow Engine Generator [Volume 8, Issue 1, 2010]
  • Yousefzadeh Bahri, Alireza Fuzzy Base Queuing and Compared it with Differentiated Services Random Early Detection [Volume 7, Issue 1, 2009]
  • Youssefi, Shahbaz An Energy-Optimal Real-Time Scheduling Algorithm for Unrelated DVS-Enabled Parallel Machines [Volume 13, Issue 2, 2016]
Z
  • Zakeri, Morteza Learning to Predict Software Testability Axiomatically [Volume 19, Issue 1, 2025, Pages 43-53]
  • Zamani Dehkordi, Behzad Speech Enhancement Using Two New Filters Based on a Posteriori Probability Distribution of Wavelet Coefficients [Volume 6, Issue 3, 2008]
  • Zamanifar, Kamran Proposing An Improved Approach Based on Semantic Analysis to Access Information in Social Network [Volume 12, Issue 1, 2014]
  • Zangeneh Var, Alireza Porosity Evaluation Using Artificial Neural Network, Optimized with GA and PSO [Volume 20, Issue 1, 2026, Pages 46-52]
  • Zangeneh Var, Alireza Application of Optimized Artificial Neural Networks for Predicting Reservoir Permeability [(Articles in Press)]
  • Zare, Maryam A New Automatic Method for ICA Detection in Online Social Networks [Volume 14, Issue 2, 2017]
  • Zareei, Zahra Efficient Symmetrical Imprecise 1-Bit Full Adder Cells Using CNFET Technology for Image Processing Applications [Volume 17, Issue 2, 2020, Pages 46-61]
  • Zarei, Alireza A New Algorithm for Guarding Triangulated Irregular Networks* [Volume 2, Issue 2, 2005]